Top Banner

of 41

Abstract Final 2009

Apr 09, 2018

Download

Documents

Inam Ul Haq
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/8/2019 Abstract Final 2009

    1/41

    1

    CCOOLLLLEEGGEE OOFFEELLEECCTTRRIICCAALL AANNDDMMEECCHHAANNIICCAALLEENNGGIINNEEEERRIINNGG

    DDEESSTTIINNEEDD TTOOWWAARRDDSS AA SSHHIINNIINNGG FFUUTTUURREE

    88TTHH

    AALLLLPPAAKKIISSTTAANNIINNTTEERRCCOOLLLLEEGGEESS//UUNNIIVVEERRSSIITTIIEESS

    CCOOMMPPUUTTEERRPPRROOJJEECCTTEEXXHHIIBBIITTIIOONN&&CCOOMMPPEETTIITTIIOONN

    CCOOMMPPPPEECC22000099

    The college of Electrical and Mechanical Engineering (E&ME) is the largest constituentcollege of NUST. In 1996 it was declared the best engineering institution in the country

    by PEC and subsequently in 1999 it received ISO 9001 certification. College of EME hasremained a hub of academic activity for long and has the distinction of conducting

    numerous seminars, workshops and lectures by established people of the academia.

    In keeping with its exemplary tradition the department of Computer Engineering takesgreat pride in announcing the 8

    thAll Pakistan Inter Colleges/Universities COMPuter

    Exhibition & Competition COMPPEC 2009 to be held from 16th

    to 17th

    July 2009.COMPPEC 2009 gives the nations budding engineers and scientist a platform to

    showcase their work and it facilitate a cooperative environment between industryprofessionals and the young entrepreneur.

    This software competition will enable all participants to enhance quality of software

    products and provide nation-wide forum to refine ideas through public display andfeedback. Such type of events also help in increasing public awareness about IT, creating

    a sense of competition, enthusiasm among participants, encouraging and promoting the

    process of high quality software development to meet ever increasing requirements of thecountry.

    Director COMPPEC 2009

    (Dr. Muhammad Younus Javed)

  • 8/8/2019 Abstract Final 2009

    2/41

    2

    Table of Contents

    LIST OF INSTITTUES ................................................................................................... 4LIST OF JUDGES .......................................................................................................... 5

    CONTROL / AUTOMATED SYSTEMS ........................................................................ 7Wireless Automatic Fire Detection Transceiver System & Autonomous Fire Fighting

    Robot .......................................................................................................................... 83-Axis CNC Milling and Drilling Machine .................................................................. 9

    Pitch Control of Remote Controlled Aircraft ................................................................ 9Trajectory Control of Robotic Arm Using Kinematics ............................................... 10

    Design and Simulation of Autopilot for Control and Navigation of an UnmannedAerial Vehicle ........................................................................................................... 10

    Microcontroller Based Remote Devices Control System ............................................ 11Design, Simulation and Fabrication of Prototype of Power Section of Positive

    Displacement MUD Motor ........................................................................................ 11

    SIP based Call Center Complaint System................................................................... 12Design, Simulation and Fabrication of Cross Flow Micro Hydro Turbine .................. 12Autopilot Control System for Fixed Wing RC Airplane ............................................. 13

    Implementation of simultaneous localization and mapping (SLAM) People BOT ...... 14Automated Highway Driving System ........................................................................ 15

    Supervisory Control and Data Acquisition (SCADA) System .................................... 15Autonomous PCB drilling machine ........................................................................... 16

    Monitoring of Locomotive in Pakistan GPS & Microwave Link ................................ 16SIGNAL / IMAGE PROCESSING................................................................................ 18

    Angiogram Enhancement using Pseudo-Colour Image Processing ............................. 19Think Done! A Brain Computer Interface (BCI) ........................................................ 19

    DNA Gel Image Analysis and Identification System.................................................. 19Automatic System for Brain MRI on Cell Phone ....................................................... 20

    Head Mouse .............................................................................................................. 21Automatic target recognition (ATR) .......................................................................... 21

    Auto Entry Point Automation using Face Recognition ............................................... 22Retinal image enhancement and feature extraction (Diabetic Retinopathy) ................ 22

    Spectrum Sensor for Cognitive Radio ........................................................................ 23Image Capturing using UAVs .................................................................................... 23

    Risk Indication to Sudden Cardiac Death using High Resolution ECG ...................... 24Automatic Speaker Recognition System .................................................................... 24

    Wi-Fi Location Tracking System ............................................................................... 25

    NETWORK / COMMUNICATION SYSTEMS ............................................................ 27Mobile Jammer .......................................................................................................... 28Remote PC Operations through PDA ......................................................................... 28

    Performance Evaluation of WIMAX IEEE 802.16 ..................................................... 29OFDM Waveform for Software Defined Radio.......................................................... 30

    Performance Evaluation of Stream Ciphers on Large Databases ................................ 30Implementation of Open Source IMS (IP Multimedia Subsystem) ............................. 31

    APPLICATION / UTILITIES ....................................................................................... 32

  • 8/8/2019 Abstract Final 2009

    3/41

    3

    An Interactive Program that Helps to Pass the Driving Theory Test: Learn BeforeDrive ......................................................................................................................... 33

    Dream World Code Generator (UML to C# Automatic Code Generator) ................... 34Semantic Bees Semantic Profiling Framework for Facilitating Distributed

    Collaboration in Scientific Research Communities .................................................... 34

    Semantic Eye ............................................................................................................. 35Computerized Fault Management System .................................................................. 36Media Player Application .......................................................................................... 36

    MEMVIZ (A Memory Visualization Toolkit) ............................................................ 37S

    3(Safety, Security, Service) ..................................................................................... 37

    Artillery Tactical Command and Reporting System ................................................... 38Visualization and Implementation OF DES and AES ................................................. 39

    A Semi-Automated Optimal Threat Evaluation and Weapon Assignment Utility forMulti-Air Borne Threats ............................................................................................ 39

    Fingerprint Based Access Control System ................................................................. 40Vital Sign: Personal Signature based Biometric authentication system ....................... 41

  • 8/8/2019 Abstract Final 2009

    4/41

    4

    LIST OF INSTITTUES

    COMSATS, WAH. Wah Engineering College, WAH. NUCES, Islamabad. NUCES, Peshawar. Islamia University, Bahawalpur. KICSIT, Rawalpindi. Bahria Unviersity, Islamabad. Military College of Signals, Rawalpindi. PIEAS, Nilore. Sarhad University, Peshawar. MAJU, Islamabad. FJWU, Rawalpindi. University Of Azad Jammu and Kashmir. Peshawar College of Engineering. University Institute of Information Technology, Pir Mehar

    Ali Shah, Arid Agriculture University. Iqra University, Islamabad. NWFP University of Engineering and Technology Peshawar. School of Electrical Engineering and Computer Sciences

    (SEECS), Islamabad.

    College of EME (NUST), Rawalpindi.

  • 8/8/2019 Abstract Final 2009

    5/41

    5

    LIST OF JUDGES

    Mr. Abdul Basit Dr. Sikandar Khayal Dr. Naveed Rao Dr. Almas Anjum Prof. Dr. Zahid Saleem Col. Naveed Khattak Dr. Ejaz Muhammad Dr. Jamil Dr. Muhammad Afzal Dr. Adeel Akram Dr. Adeel Baig Dr. Syed Ali Khayam Brig. Muhammad Baqar Col. Zahoor Fazal Qadri Prof Muhammad Sharif Malik Dr. Mehboob Yasin Dr. Shazad A. Malik

  • 8/8/2019 Abstract Final 2009

    6/41

  • 8/8/2019 Abstract Final 2009

    7/41

    7

    CONTROL / AUTOMATED SYSTEMS

  • 8/8/2019 Abstract Final 2009

    8/41

    8

    Wireless Automatic Fire Detection Transceiver System &Autonomous Fire Fighting Robot

    Firefighting is an important but dangerous occupation. A firefighter must be able to get toa fire quickly and safely extinguish the fire, preventing further damage and reducefatalities. Our task as electrical engineers is to design and build a prototype system thatcould autonomously detect and extinguish a fire. Also aims at minimizing air pollution.As its name implies this project have two major divisions.

    1. Wireless Automatic Fire Detection Transceiver System.2. Autonomous Fire Fighting Robot.

    The complete system includes the circuitry for detecting the fire plus a transmitter sectionwhich will detect the fire at a remote location and send different 21-bit codes to the robotto specify the different locations in the field using RC5 protocol on a wireless medium(air). The receiver is located at robot through by it will receive and decode the received21-bit code, then robot go to that specific location of which code have been received andextinguish the fire.

    At the heart of the system is the microcontroller. Program code to control the fire fightingrobot is written in C language. The system controls two stepper motors for precisionmovement. Furthermore, the robot performs analog to digital conversion on multipleinfrared sensors to detect floor markings. Once the robot detects the candle, itextinguishes the flame and returns to its starting point. The extinguishing system iscomprised of a large fan.

    Developer:Abdul Atisam Farooq

    Bahria Unviersity, Islamabad

  • 8/8/2019 Abstract Final 2009

    9/41

    9

    3-Axis CNC Milling and Drilling Machine

    CNC machines offers high precision machined components via CNC milling machinesand turning machines that can perform multiple machining operations with various typeof cutting tools by utilizing the latest techniques and technology to give the extremelyaccurate and precise machined components.

    What is milling? Milling is the process of machining flat, angular, curved, or irregularsurfaces by feeding the work piece against a rotating cutter containing a number ofcutting edges. The surface may also be milled to any combination of shapes. The millingmachine consists basically of a motor driven spindle, which mounts and revolves themilling cutter, and a reciprocating adjustable worktable, which mounts and feeds thework piece.

    The hardware of this project is interfaced with the industry standard software running onPC such as KCam, Mach3, EMC2, and TurboCNC etc. which read the G-Code files andgenerate step and direction signals at parallel port to move the stepper motors. Thecomplete hardware including the milling machine 3D table, parallel port interface card

    and stepper motor controller.

    Fully integrated CNC machines will use G codes, M codes and others CNC programminglanguages codes such as F, S, N, X, Y, Z, A, B and C codes to control the overallmachine.

    G codes is a common name in the CNC programming language that begins with the letterG. Basically, the G codes tell the machine tool what type of action need to perform andtrigger the CNC machine tools axis movement.

    Developer:Abdul Atisam Farooq,

    Bahria Unviersity, Islamabad.

    Pitch Control of Remote Controlled Aircraft

    The objective was to convert a remote controlled aircraft into an autonomous systemwhich will control the Pitch movements of RC plane and will counter disturbances inPitch moments. Feedback system is designed and implemented to achieve controlharness.LabVIEW and Data Acquisition card was used for communication between Computerand Sensor. Data from sensor was processed and algorithm was designed to calculateangle. The noise issues were countered. This was then mapped on to PIC controller.

    Advanced Aircraft Analysis software with Profilli software was used to find out theTransfer Function of the Aircraft. A controller was designed to counter pitch moments.This Controller was discretized and mapped on PIC. After that the requirement was tocontrol servo motors according to Controller output. This was done using PIC. Oneexternal memory was used to record the on flight results. The total Hardware was anonboard embedded system which could be installed in the aircraft to deal with pitchmoments as well as it will be test bench for any further pitch controller.

    Developers:

  • 8/8/2019 Abstract Final 2009

    10/41

    10

    Hammad HassanMohsin AliAthar WaseemSyed Ussama Ali

    MAJU, Islamabad.

    Trajectory Control of Robotic Arm Using Kinematics

    This project deals with the trajectory control of robotic arm using kinematics in whichmathematical equations are solved using kinematics. Two approaches are conducted toformulate a Mathematical Model in order to make it useful for the transplantation in theindustry. This Mathematical Model is generic and can be implemented on the Lynx 6robotic arms.

    Kinematics plays an important role in the generation of Mathematical Model. We have

    used forward kinematics and due to structural limitations we have shifted our work to theinverse kinematics. The advantage of this model is that we have gained a full control ofthe robotic arm and we can formulate any trajectory according to our own desire. Thedesigned model has been implemented and robotic arm is communicated through serialport.

    Developers:M. Ihtaram-ul-HaqZain Munir Bin TariqBasit Manzoor Abbasi

    MAJU, Islamabad.

    Design and Simulation of Autopilot for Control and Navigation ofan Unmanned Aerial Vehicle

    The objective of our project is to develop an Autopilot and Auto-navigation system for anUnmanned Aerial Vehicle (UAV). Since in a UAV there are no human pilots, thereforean Autopilot acts as an intelligent and autonomous system to ensure stable flight andexecute an assigned mission. Our complete Flight Control System (FCS), composed ofautopilot and auto-navigation systems, establishes stability and performance based on theUAV model and aerodynamics.

    The project commenced with a thorough study of Aircraft Dynamics, leading to thederivation of a true non-linear mathematical model of the aircraft. This model is thenbifurcated in different flight mode models and made linear. A number of controltechniques were applied to stabilize the plane, with simulations being done at each step.A complete Autopilot hardware is developed that comprises of a high end microcontrollerwith DSP capabilities for implementing/running the complete control algorithms,integrating the sensors and actuators. The Auto-navigation system was developed inparallel with the Autopilot. The designed system enables the UAV to navigate to anassigned location through pre-defined way points in a stable flight.

  • 8/8/2019 Abstract Final 2009

    11/41

    11

    Simulations of the complete Flight Control System with robust/modern and classicalcontrol techniques have been carried out, with testing being done using Visual FlightGear software and Simulink Model. A complete system has been developed to stabilize arange of fixed-wing propeller driven UAVs.

    Developers:

    Syed Saifullah ShahSyed Muhammad Umar SaeedBilal Ahmed Raja

    College of E&ME

    Microcontroller Based Remote Devices Control System

    The theme of our project is to control multiple devices (each device performs differentfunction) from remote area using a single control station. We have four phases in our

    project, one of which is the data acquisition from energy meters. The other one is theintelligent traffic control system. The third phase is the LCD DISPLAY used foradvertisement and public guidance purposes. The fourth phase is the BULB in which weare giving an idea of controlling machines in industry from remote location.

    Developer:Saqib jamilIshaq HussainSajjad HussainUsman Akhtar

    Peshawar College of Engineering.

    Design, Simulation and Fabrication of Prototype of PowerSection of Positive Displacement MUD Motor

    The oil and gas industry is one the most rapidly developing industry. The equipment andthe tools used in the oil and gas industry worth millions of dollars and are manufacturedin the foreign countries like America; France and Canada etc. The power section of apositive displacement drill motor (PDM) converts the hydraulic energy of high pressuredrilling fluid to mechanical energy in the form of torque output for the drill bit. A powersection consists of a helical-shaped rotor and stator. The rotor is typically made of steeland is either chrome plated or coated for wear resistance. The stator is a heat-treated

    steel tube lined with a helical-shaped elastomeric insert.

    A previously designed mud motor was analyzed using Rapidform software andsignificant deviations of dimension between the designed and manufactured mud motorwere found. Due to those deviations the rotor of mud motor could not be fitted into thestator. So a redesigning and reanalysis was required. Designing was done in the PRO-Esoftware. After the designing phase was completed, the analysis of the mud motor wasdone in CFDesign and PRO-E.

  • 8/8/2019 Abstract Final 2009

    12/41

    12

    In the Pro E software, the part interferences between the stator and rotor were checked.Then the hydraulic properties were checked in CFDesign software. Different design andperformance parameter like volumetric flow rate, velocity of fluid, and rotational speedof the rotor, pressure drop and hydraulic horse power were calculated and compared withthe theoretical calculations to determine the percentage difference in the values.

    Developers:Hamzah SardarAyaz AhmedMuhammad Enam ud Haq

    College of E&ME.

    SIP based Call Center Complaint System

    The call center industry becomes vital in today world. Call centers needs support of

    modern telephony systems (VoIP). A lot of development is still required in that sector.The most of call centers face lot of calls burden on their end having limited humanresource. This burden is manageable by doing some systematic study of business andgiving its technological solution which cop up with automation strength and needs lessor no human resource. In this project we have examined the call centers business andalso examine our purposed automatic complaint system developed and tested by us andthen compare the results and find out the improvement in call centers operations. Theexisting system has many flaws and employing much burden on Agents. The much oftime of agent is wasted during taking complaints of customers. The Agents also haveprobability to log wrong complaints. These complaints calls have also heavy callfrequency and take lot of time of agents. The Solution for the complaints is sent back tocustomer after investigating the problem and it requires lot of time. These Work codesare ideal for taking automatic complaints from the system. The purposed system

    automates the Complaints and it bypasses the Agents and directly log complaints todesired department of the customer. This process is done through Automatic callreceiving and guiding customers through IVR and takes customer responses throughDTMF. The complaint is recorded by our system and logged into database. The webinterface is available to query that complaints and take its content. The web interfacefinally provide feature to give remarks of complaint and send SMS through GSMtechnology.

    Developer:Mughees Ahmad

    COMSATS, WAH.

    Design, Simulation and Fabrication of Cross Flow Micro HydroTurbine

    The primary objective of this project is to design a micro hydro turbine to cope up theelectricity needs of people living in remote areas, where its not feasible for wapda tosupply electricity. It will be a cross flow turbine which has the capability of producing

  • 8/8/2019 Abstract Final 2009

    13/41

    13

    electricity even under low heads. It can operate with discharges between .02 m3/sec and10 m3/sec and heads between 1 and 200 m. A cross-flow turbine is drum-shaped and usesan elongated, rectangular-section nozzle directed against curved vanes on a cylindricallyshaped runner. It resembles a "squirrel cage" blower. A guide vane at the entrance to theturbine directs the flow without jerk into a limited portion of the runner. Modeling wasdone in Pro-E and Simulation in CF DESIGN v-9.

    Developers:Amar KhalidNasir AliArsalan Ahmad

    College of E&ME.

    Autopilot Control System for Fixed Wing RC Airplane

    This report is about the project titled Implementation of Hardware and SoftwareArchitectures for Autonomous Flight, Localization and Navigation of an RC Airplane.Aim of this project is to make an Aircraft that may fly autonomously from one given waypoint to another. It may track a target and navigate autonomously.

    For this purpose we used Cadet Senior MK-II. We used Linux operating system runningon a Single Board computer (SBC) which is mounted on the aircraft. We used GPS andIMU for measuring orientation and motion parameters of aircraft and used KalmanFiltering technique to fuse the data of these sensors and calculate the angles for elevator,rudder, aileron and throttle to control the aircraft. We mounted a camera that sends livevideo to the ground station where a video receiver receives it and displays it on computeron ground station.

    We had made two successful flights of the aircraft with and without the payload. Now wewill mount our system i.e. SBC, GPS, IMU, Camera, Wireless Module, VideoTransmitter etc on the aircraft and will fly it manually. During the flight our system willcapture the readings of the sensors and make log files with system time stamped andwireless module and video transmitter will send the data and the video to the groundstation. Then we will analysis this data and apply controls on this data.

    Developers:Ahsan Ijaz

    Haris NaeemNaveed Anjum

    Umair Shafique

    College of E&ME.

  • 8/8/2019 Abstract Final 2009

    14/41

    14

    Implementation of simultaneous localization and mapping(SLAM) People BOT

    This project aimed at developing an autonomous platform which can navigate and

    interact intelligently in an indoor environment while building its map at the same time.This involved implementation of SLAM (simultaneous localization And Mapping)

    algorithm which can govern the state characteristics of a mobile robot. The algorithmenabled the robot to maintain a very accurate estimate of its location with respect to its

    surrounding while simultaneously building an incremental map. The project achievedsuccessful extraction of features from the environment as well as accurate estimation of

    the robot position during the mapping process.

    SLAM consists of multiple parts; Landmark extraction, data association, state estimation,state update and landmark update. There are many ways to solve each of the smaller

    parts. The goal of the process is to use the environment to update the position of the

    robot. Since the odometry of the robot (which gives the robots position) is oftenerroneous we cannot rely directly on it. We can use laser scans of the environment tocorrect the position of the Robot. This is accomplished by extracting features from the

    environment and re-observing these features when the robot moves around. Thesefeatures are commonly called landmarks and will be explained later.

    State Estimation is a vital step in achieving SLAM. The different techniques studied will

    be described later. From among these techniques, we selected Relative Filter whichproves to computationally more efficient as compared to the other techniques. It keeps

    track of an estimate of the robots position and also the landmarks the robot has seen inthe environment.

    Landmark extraction is the other important step in SLAM. Researchers have

    implemented various techniques for this purpose. Hough transform is one techniqueamong these which is very reliable feature extraction algorithm. So we have chosen this

    approach in our SLAM implementation.

    We will be implementing SLAM on the robot Pioneer PeopleBot. PeopleBot runsindoors on flat floors. It can traverse low sills and household power cords. With upperand lower sensing, the PeopleBot can turn away from nearly all obstacles.

    Developers:

    Affan PervaizMuhammad Ahmer

    Zohaib Riaz

    College of E&ME.

  • 8/8/2019 Abstract Final 2009

    15/41

    15

    Automated Highway Driving System

    With increase in sophistication, standardization and uniformity in uilding of highways

    and motorways and cheap availability of powerful ameras, sensors and fast processing

    computers, it is now possible to design trategies based on vision and evolutionarytechniques for autonomous driving. This aims at building a system capable of lanedetection on motorway and of steering of SUZUKI Mehran car to maintain its lane.We

    also undertake a task of developing a generic strategy capable of driving a car on pavedroad in diverse environment.

    Developers:

    Muhammad Jamal AfridiMhequb Hayat

    Salman Manzoor

    College of E&ME.

    Supervisory Control and Data Acquisition (SCADA) System

    Our project title is SCADA system. SCADA is an acronym that stands for Supervisory

    Control and Data Acquisition. Basically it is a system that collects data from differentsensors , transceivers in a factory and sends this data to the central computer which then

    manages and monitors that data. Basically we design SCADA system for industrialautomation, the current system in most industries is manual.

    We have design a GUI and a Plant in LABVIEW. From GUI we are controlling the

    parameters of an industry which are:

    1. Temperature2. Speed3. Level4. Voltage (Monitoring)

    For Example: When an Operator want to run the motor according to his desired RPM,then he will set desired RPM and switch ON the motor, GUI will transmit two strings to

    our hardware. In hardware, Microcontroller will receive these strings, if the string isanalog, it will convert it in a decimal value and generate PWM. PWM is converted into

    +/- 10 volts and will send these voltages to the Plant. If the string is digital,Microcontroller will convert it into hexadecimal form. This hex value will send to port B

    & port C. Then this data will go to plant, and plant will act accordingly. We have doneour project using guided media; it can be done through unguided media.

    Developers:

  • 8/8/2019 Abstract Final 2009

    16/41

    16

    Ehsan AhmedShahid Ali

    Rustam JavedGhulam Mustafa

    KICSIT, Rawalpindi.

    Autonomous PCB drilling machine

    Creating holes on Printed Circuit Boards is an important stage in Electronic Production.

    Holes of different sizes and larger number of positions (up to thousand) must be drilledwith high precision for manual or automatic insertion of various electronic devices and

    components. The solution is to build an automatic PCB drill machine. Driller for PrintedCircuit Boards presents a working prototype that produces good results

    for PCBs. The PCB pattern of the circuit schematic diagram is drawn on the monitorscreen with the help of software such as ULTIBOARD that contains the drill hole data ofa PCB layout produced in the CAD software. From the PC the information of the drill file

    is transferred to the microcontroller through serial communication. And microcontrollerwill drive the stepper motor drive (for different axis), and an AC motor using relay for

    drilling a desired hole.

    Developers:Abdul Hanan

    Adil RaufMehmood Ali

    College of E&ME.

    Monitoring of Locomotive in Pakistan GPS & Microwave Link

    The current locomotive monitoring system is totally manual. The reason behind to choose

    Locomotive Monitoring System specifically is because the current system has differentdrawbacks.

    There is no mechanism for track monitoring. No time optimization No clearer look forwarding view of the tracks No proper track monitoring system. Inefficient way of communication

    The system that we have proposed is based on hardware and software which helps tocontrol and monitors the locomotive system in Pakistan.

  • 8/8/2019 Abstract Final 2009

    17/41

    17

    In our system the movement of locomotive and track monitoring is done through virtual

    GPS and Microwave link. We have created two main HMI (Human Machine Interface)on two Computers. One is Graphical HMI and the second one is Virtual GPS. Both have

    developed in LABVIEW6.1 and they interact with each other through Serial

    Communication.

    The virtual GPS sends the coordinates to the Graphical HMI through serial Port.

    Graphical HMI accepts these coordinates and shows the graphical movement oflocomotive on the map. There is also LCD display and the railway crossing control

    modules created virtually which helps in displaying information about the trains, stationsand controlling the railway crossing mechanism.

    The system that we have proposed is basically polling based, for future enhancement this

    system will be switched to the interrupt based system.

    Real time signal handling of locomotive will be handled.

    Serial communication will be switched to RS-485. Microwave link with Feedback Units e.g. crossing and signal feedbacks.

    Developers:Kalim Ahmed Riaz

    Muhammad NaveedJamal Muhammad

    KICSIT, Rawalpindi.

  • 8/8/2019 Abstract Final 2009

    18/41

  • 8/8/2019 Abstract Final 2009

    19/41

    19

    Angiogram Enhancement using Pseudo-Colour ImageProcessingAngiography (i.e. vessel imaging after the injection of a radio-opaque substance) is awidely used procedure for vessel observation in both clinical routine and medicalresearch. Our project deals with the enhancement of angiogram so that we can facilitatethe physician in his diagnoses process. Often for the subsequent analysis of thevasculature it is needed to measure the angiogram area covered by vessels and/or thevessel length. For this purpose we need vessel enhancement and segmentation.While there are already many organ specific vessel segmentation algorithms, we proposein this contribution a more general method which includes a Hessian based vesselenhancement diffusion filtering step performed on the basis of scale and then pseudo-colour processing to enhance the image because we know that human eye appeal more tocolours then to black and white images hence therefore the diagnoses from a colouredangiogram will be more accurate.

    Developers:M. Danish Waqar

    M. Amir Moazzam Khan

    Wah Engineering College, WAH.

    Think Done! A Brain Computer Interface (BCI)Interaction with any machine requires a very smooth and efficient interface between themachine and its users. Humans using computers are familiar with a number of interfacessuch as keyboard, mouse, touch screens etc. All these interfaces have one thing incommon: they require physical movement by the user. This physical movement may notbe possible in some situations such as Virtual Reality environment, daily routine works

    for disabled people etc. A Brain Computer Interface (BCI) is such an interface in which aperson uses his brain to control the machine to be used, this machine can be a computer, awheel chair or anything, thus providing control of surroundings without physicalmovement.

    Developers:Muhammad Bilal KhanIntisar RizwanFarhan TahirSarmad Munir

    Military College of Signals, Rawalpindi.

    DNA Gel Image Analysis and Identification SystemDNA Identification System (DNAIS) is a model system to store persons/criminalsinformation on the base of DNA sequence obtained by their DNA Gel image analysis.The system proposed is designed as an inspiration to FBIs DNA technology which iswidely used all over the world by them to identify any person which has record in theirDNA database. Using the same technology they can find the rape culprits, murderers,terrorist even the people died in any fire incident or plane crashes.

  • 8/8/2019 Abstract Final 2009

    20/41

    20

    As project mainly concentrate on DNA Gel Image analysis so keeping the friendly userinterface the system should provide all necessary DNA Gel image processing facilities. ASequence Finder wizard which asks the administrator to browse a source image andperform different operations step by step as well as providing the facility to administratorto generate the sequence by hiding un-necessary image processing tasks from the user.

    Also the system is capable of managing records for persons, criminals with their crimedetails. The system is capable to manage Crime Details committed by the criminals andable to generate report of crime details for the criminal which can be provide to the crimebureau for their use.

    The genomic DNA obtained can be considered as someones DNA Fingerprint. So oursystem stores the DNA Sequence generated after analyzing the DNA Gel image andstores in database for future use. As DNA sequence is unique and it is probable that 1 in aMillion can have same DNA sequence. Especially targeting on VNTR regions we cancome up to only Identical twins have same DNA sequence. Currently system storespersons and criminals information with criminals crime details and any person/criminalcan be identified later in any incident or criminal activity involved.

    Developer:Muzammil-ul-rehman

    Islamia University, Bahawalpur.

    Automatic System for Brain MRI on Cell PhoneThe system named Automatic system for Brain MRI on cell phone basically consists oftwo modules. First is a Desktop Application and the second is Mobile application.Firstly, operations that comprise the Desktop application module of the project areManaging Patients and Users, Preprocessing operations--Image Brightness and Contrast,

    Sharpen an Image, Blur the Image, Detect Edges of an Image and Cropping the MRIimage to extract the ROI efficiently and accurately. Secondly the mobile applicationprovides the offline view of those extracted ROIs for further analysis by the doctors orradiologists. Because the computers are not always available so it facilitates the doctorsand radiologists to offline study and analyze the MRI images for further processing on it.

    The flow of the system is that it will acquire images from the MRI images database andfeed the system for preprocessing the images as per need. The manipulations on imagesthat are provided in project are Image Contrast enhancement, Image Sharpness, ImageBrightness, Edge Detection, Image Blur and conversion to Grayscale. Then the systemcrops the original image into a sub images and transfers those to a mobile device that iscell phone in our case for further detection or processing purposes on a computer as wellas on a mobile device.

    Developer:Syeda Maria Gillani

    Dept. of Computer Sciences & IT, The Islamia University of Bahawalpur.

  • 8/8/2019 Abstract Final 2009

    21/41

    21

    Head MouseHeadMouse belongs directly to the field of human-computer interaction, in the followingera human beings are getting closer to the machines by discovering and inventing newideas and techniques. The software replaces the standard computer mouse for people whocannot use or have limited use of their hands when controlling a computer oraugmentative communication device. The HeadMouse translates natural movements of auser's head into directly proportional movements of the computer mouse pointer. TheHeadMouse has a wireless IR LED with 9v battery which tracks a tiny disposable targetthat is conveniently placed on the users forehead, glasses, hat, etc. On the front side overthe monitor or where ever it is feasible a simple camera is placed which tracks the IRLED movement and it works just like a computer mouse, with the mouse pointer beingmoved by the motion of the users head.

    It has many advantages for the people who are physically disable like if they are sufferingfrom quadriplegic or if they are stroked HeadMouse is one of the best solution for thebasic use of the computer to them.

    Developer:Faheem Ahmad

    COMSATS, WAH.

    Automatic target recognition (ATR)The application of automatic target recognition (ATR) technology is a critical element ofelectronic warfare (EW), advanced avionics, smart weapons, and intelligence,surveillance, reconnaissance (ISR). The success of ATR technology in the Persian GulfWar, and its applications in unmanned robotic combat vehicles, has made its continueddevelopment a top priority within the DoD. Objective of this project is to re-construct theMACH based object recognition filter to process images for object recognition byincorporating log-polar transformation of the images to make it compatible with thehuman vision sensor eye in processing.

    In this project my basic task is to design data processing algorithm to recognize object ofinterest in a scene. The algorithm under the acronym ATR is part of the general field ofdata, signal and image interpretation. It consists of producing a decision about the natureof objects and to decide the occurrence of the object and also multi occurrence in thescene. Basic purpose of my project is to overcome the distortions of scale and orientationof the object. Such algorithms are of interest in fields as varied as remote detection,security, intelligence, situation analysis and fire control for military systems.

    Developer:Safdar Khan

    COMSATS, WAH.

  • 8/8/2019 Abstract Final 2009

    22/41

    22

    Auto Entry Point Automation using Face Recognition

    Face is a primary focus of attention in social intercourse, playing a major role inidentification. Familiar Faces can be identified after a separation of time. To differentiatebetween the faces, significant facial features can be used. In the proposed system amethod of making face book against every individual is used. Every training image isrecorded in a database as a single numeric value. Block based transform is used forenergy compaction and reduce the bandwidth consumption. Modified binary search anddatabase generation process helps in fast searching and high recognition rate.

    In Face Recognition System, identification of images is involved. First step is to segmenta face from the input image. DCT transform is used for block based co efficients analysison segmented face region. It greatly reduces the original data to represent an image. Asystem based on face recognition is used for security issues for authorization andunauthorization. Images captured for offline training are stored in a Dataset and forcomparison purposes real time images are also captured to identify that either the imageis recognized or not recognized. The input image is processed as same the training

    images and search for a value is done in a database to find the most appropriate match.

    Developers:Danish Sattar

    Kamran Ayyub

    COMSATS, WAH.

    Retinal image enhancement and feature extraction (DiabeticRetinopathy)

    Diabetic retinopathy is a severe and widely spread eye disease. It is the most commoncause of blindness in the working-age population. Diabetes affects almost every one outof ten persons, and has associated complications such as vision loss, heart failure andstroke. Complication of diabetes, causing abnormalities in the retina and in the worst caseblindness, is called diabetic retinopathy. There are no such symptoms in the early stagesof diabetes, but the complications increases in the advanced stages. Small changes in theretinal capillary indicate the beginning of diabetic retinopathy . Therefore to assist in thediagnosis of diabetic retinopathy, retinal images can be used as developing tools .

    Automated diagnosis of Diabetic Retinopathy is done by taking retinal images intoaccount. Automatic screening system for diabetic retinopathy can save cost and timerequire for manual screening done by an ophthalmologist. Abnormalities caused bydiabetic retinopathy in the retina can be detected by applying different image processing

    techniques on color retinal images. All the algorithms will be tested on available standarddatabases. For best working of algorithms, the detected abnormalities from retinal imageswill be verified by an ophthalmologist.

    Developers:Ali AtzazUmair Ali Khan Niazi

    College of E&ME.

  • 8/8/2019 Abstract Final 2009

    23/41

    23

    Spectrum Sensor for Cognitive Radio

    With new radio frequency devices entering the technological world everyday, thedemands on the limited radio frequency spectrum are increasing as well. A CognitiveRadio provides an intelligent solution to the problem by sensing spectrum white spacesi.e. unutilised channels in a particular band of operation, in its surroundings and tuning itstransmitter to any one of these. This way, it not only prevents the wastage of the spectrumthat occurs whenever a user licensed to a band of spectrum is not using it but alsoincreases opportunities for useful communication to take place. At present, IEEE isdeveloping a standard 802.22 for Cognitive Wireless Regional Area Networks (WRAN)in unused TV bands.

    Spectrum Sensing being the core of the Cogntive Radio technology, this project is basedon developing a prototype Spectrum Sensor based on the idea of carrier energy detection.Radio transmissions occur over particular frequency carriers, thereby sensing a channel

    for presence of a carrier frequency provides sufficient information about the occupancyof a frequency channel. Sensing for carrier energy, particularly at low SNR requires,application of detection theory principles in order to achieve the desired probability ofdetection as well as maintaining false alarm rate at a constant. From a range of spectralanalysis algorithms, the use of Fast Fourier Transform (FFT) is by far a common one,however it is a bit costly in terms of resources when implemented in hardware. OurFPGA-based Spectrum Sensor, on the other hand, uses the Goertzel Algorithm which is acarrier detection optimised variant of FFT and is efficient both in terms of consumptionof FPGA resources as well as the sensing time. Its incorporation with the appropriate RFfront end and analog-to-digital converter as required by the band of frequency channels tobe sensed, can provide efficient carrier detection for Spectrum Sensing in CognitiveRadio and other related applications.

    Developers:Rabia MaqboolSahil Nadeem Baig

    College of E&ME.

    Image Capturing using UAVs

    Unmanned aerial vehicles (UAVs) have attracted interest for their ability to carry outmissions such as border patrol, urban traffic monitoring, persistent surveillance, and

    search and rescue operations. Most of these missions require the ability to detect andtrack objects of interest on or near the ground. In addition most of the missions areinherently long duration requiring UAVs to cooperate over the time period. This projectpresents a framework to enable such missions to be carried out autonomously. In UAVslive image capturing a vision based target detection and determination that utilizes avideo camera onboard UAV is present.Live images are captured using video camera and then target detection is done using theimage processing this will enable us to find the real time targeted objects, helps us incompleting our missions, in this technique the hardware used is video camera mounted on

  • 8/8/2019 Abstract Final 2009

    24/41

    24

    unmanned aerial vehicles and location to store the images. For this purpose TV card isused to store and retrieve images. Image processing is used for target detection viaMatlab software.

    Finally, in future more improvements can be done by modifying the computing andcommunication hardware used for the experiments to be carried onboard the UAVs,

    which would be important for implementation in a system to be used over large distancewhere communication bandwidth between UAVs and their ground station is limited.Further investigation of these issues could lead to highly autonomous, robust UAVsystem that can reliably perform very useful, real world missions over long periods oftime with little or no human intervention.

    Developers:Fahad NaseerAdnan Razzaq

    NUCES, Peshawar.

    Risk Indication to Sudden Cardiac Death using High ResolutionECG

    The purpose of this project is to employ computers for analyzing ECG signals and predicta risk of Sudden Cardiac Death (SCD). While the problem is not as simple to solve as itmight seem, the possible benefits are immense. It can allow an immediate interpretationin the absence of a trained physician. It can also be used for real time monitoring of thesignals an intensive care situation. The first step is to convert data from ECG strip to aformat readily understood by computers. The prediction of sudden cardiac death isanalyzed in two ways. First part the Signal Averaged ECG predicts SCD on the basis ofidentification of late potentials. Second part T wave analysis predicts on the basis ofpresence of T wave alternans (TWA). The results produced by this software are thencompared with the information given about that particular signal from the source. Thesignals used in this project comprise actual patient data available from online data basesand intended for validating professional medical solutions. This work can be furtherextended to give the exact duration of time after which the individual can have a cardiacdisorder.

    Developers:Imran SharifRizwan HaiderQasim ZamanQamar Abbas

    College of E&ME.

    Automatic Speaker Recognition System

  • 8/8/2019 Abstract Final 2009

    25/41

    25

    The objective of this project is to develop a text independent Automatic SpeakerRecognition System using a technique that is robust to telephonic and non telephonic

    speech. This area of research emphasizes on overcoming the distortions and alterationsintroduced by voice channel properties such as the bandwidth limitations of telephones,

    telephone systems, and recording devices. The product developed is capable of

    restricting unauthorized speakers to a building as well as it can enroll the new speakers toenlarge the existing database. Users can access the area by providing the system their IDand a voice sample, if provided voice sample and ID matches, the access is granted

    otherwise in mismatch of either two, the speaker is not allowed to enter the area.

    The research area includes two phases, i.e. training and testing. Training is based onproposed feature extraction technique that is wavelet based Mel Frequency Cepstrum

    Coefficients (MFCCs). The approach was motivated by multi resolution property ofwavelets in denoising speech signal and MFCCs were used to mimic the behavior of

    human ear. Vector Quantization technique has been used for Speaker modeling. Fortesting phase, minimum distortion measure has been used.

    Experimental results were computed on PIEAS Speech Database of 64 speakers for text

    independent speaker identification which shows that the proposed method gives verygood recognition rate in case of both non telephonic and telephonic Speech data. In

    addition to this, analysis for choosing the appropriate number of MFCCs, the appropriatenumber of decomposition levels and wavelet type was performed. Recognition rate

    achieved is quite good i.e. 96.25% for non telephonic and 86.77% for telephonic speech.Moreover for the proposed technique, we analyzed to select best parameters and for

    PIEAS Speech Database, 38 MFCCs based on wavelet type Symlets 7 and decompositionlevel 1 have proven best.

    Developer:

    Sidra Malik

    PIEAS, Nilore.

    Wi-Fi Location Tracking System

    The objective of the project is to use 802.11b/g base-stations in order to track themovement of a mobile (moving) user. A number of algorithms have been proposed to

    achieve the above mentioned objective. However we intend to incorporate most of thealgorithms and combine them to achieve greater accuracy. The algorithms we intend to

    use are

    Triangulation RF Fingerprinting (RMS Method)

    The aim is to cover the entire EE Department using at least three beacon nodes at threeseparate locations so as to achieve accurate results. The estimate of the users location

  • 8/8/2019 Abstract Final 2009

    26/41

    26

    will be shown via a Graphical User Interface on the departments original map. Thelocation will not only be visible to the user but a system will be provided so that a person

    outside the building can too monitor the user. The project has a number of practical andcommercial uses. It can be used in Monitoring rescue workers in a rescue operation.

    Guiding robots during a fire-fight operation

    Developers:NS Abdur Rafay

    NS Adeel ShaukatNS Immad Alam

    College of E&ME.

  • 8/8/2019 Abstract Final 2009

    27/41

    27

    NETWORK / COMMUNICATIONSYSTEMS

  • 8/8/2019 Abstract Final 2009

    28/41

    28

    Mobile Jammer

    Nowadays, with the increasing number of mobile phone users is on one side, playing animportant role in the development of society but on the other hand prompting a threat to

    the security matters. This gives rise to the need of jamming mobile phone in specificplaces where the ringing of cell phone might be disruptive or even dangerous, hasincreased.

    This project describes the design and implementation of the available simplest techniquefor jamming mobile communication, i.e. the Denial of Service (DOS). Some foreignleading electronic research groups have already introduced this jamming techniquethrough noise attack. Our aim is to come up with the same jamming technique which issimpler and cost effective. In this research project, we have discussed the performance ofour developed mobile jammer in various aspects like design complexity, cost, robustness,coverage area, component availability and performance.

    A mobile phone jammer is a device that transmits a signal on the same frequency atwhich the mobile system operates. Jamming succeeds when the mobile phones in the areaare disabled. There are different techniques to jam mobile signals but we work out one ofthese techniques, i.e. Denial of Service. In Denial of Service the device transmits noisysignals continuously.

    Developers:Jawad AhmedMohsin Ali

    MAJU, Islamabad

    Remote PC Operations through PDA

    We are intended to develop an application through which user will be able to access hishome or office PC through smart phones from any remote area. There is a problemespecially to business personnel, teachers and students that they cannot access theirpersonal information when they are far from their system and if they require some pieceof information at urgent, they have to delay their task for days.

    This project is an ultimate E-Commerce solution to provide control of users home PC onsmart Phone. User can access all of his content like files and folders of his PC from hissmart phone as well as he is able to perform simple operations like file and foldermanipulation, email any file as attachment. User can view properties of files, folders and

    drives. He can manage all drives and folders, He can access system resources andservices which may b helpful in case he is somewhere away from his system and need thesystem specification, user can read files like text files, doc files and pdf files which he hasforgotten in his home or office pc and are urgent. User can also view detail of hardwareand resources installed on his PC. User can also scan the computer and can view theapplications that are in running state or in not responding state. User can administrate thesystem services. User can do all these operations from anywhere in the world where hissmart phone is working. The only requirement for using this product is system IP, andusers system should be online for the time he wanted to control his PC. Access to the PCwill be possible through User Name, Password, System Name and IP Address.

  • 8/8/2019 Abstract Final 2009

    29/41

    29

    The system which is being accessed should be on as well as online to make it accessibleAny user must have installed this application at his device through which he is accessinghis PC and he should know correct PC name and IP address otherwise it will cause inaccess deny.

    Developers:

    Syeda Iram FatimaSadia Bashir

    University Institute of Information Technology, Pir Mehar Ali Shah, AridAgriculture University.

    Performance Evaluation of WIMAX IEEE 802.16

    The two industries; broadband access and wireless are merging together for thedeployment of the Broadband Wireless Access (BWA) technology. The leading and the

    promising candidate for the BWA is WiMAX. The IEEE 802.16 standard defines a meanfor the BWA, replacing the wired broadband DSL and providing the last mile services tothe home and industry users.

    The IEEE802.16 specifies the Medium Access Control (MAC) and a set of physical layerto provide fixed and mobile Broadband Wireless Access in broad range of frequencies.We have designed a detailed overview of the standard which is mainly a combination ofOrthogonal Frequency Division Multiplexing (OFDM), Quardrature AmplitudeModulation (QAM), Convolution Coding (CC) and Reed Solomon (RS) Coding. All themandatory blocks in 802.16 are also include like Randomizer, Interleaving, adaptivemodulation and FFT/IFFT both in transmitter and receiver. A multi-path fading channelis also implemented and perfect synchronization is assumed.

    This matlab designed tool has two miles tones in it. First, its the implementation of anIEEE standard in MATLAB and secondly, this is also works as tool for the performanceevaluation by changing its different parameters like the effect of code rate, modulationorder, cyclic prefix and delay, multi-path effect and addition of noise in the channel aswell.

    Developers:Anees ul HusnainQasir Ijaz

    University College of Engineering & Technology, The Islamia University ofBahawalpur.

  • 8/8/2019 Abstract Final 2009

    30/41

    30

    OFDM Waveform for Software Defined Radio

    Orthogonal Frequency Division Multiplexing has gained considerable attention in recentyears. It has been adopted for various standards including IEEE 802.11a Wireless LANstandard. Software Defined Radio is an exciting technology which is expected toinfluence all the future communication. Software defined radio (SDR) technologyenables software components running on a generic hardware platform to perform signalprocessing instead of hardware chips. This project brings together the amalgamation ofthese novel technologies. Implementation of OFDM Transmitter and Receiver on SDRLyrtech 4 DSP Board is the highlight of this project. Transmitter and Receiverfunctionality has been made in software, the essence of SDR, in Matlab for simulationpurposes and then in Fixed Point C to port them on Lyrtech 4 DSP Board.

    Developers:Farhad MughalOmer AshfaqMinaam Ahmad Naeem

    Qurat ul Ain

    College of E&ME.

    Performance Evaluation of Stream Ciphers on Large Databases

    Alternating Step Generator and Shrinking Generator are two most commonly used clockcontrolled based stream ciphers for the generation of key stream. Both the generatorshave some common weaknesses. If these weaknesses are analyzed properly they canbreak the key stream and get the initial input bits of both the generators which are used togenerate the key. This thesis attempt to provide solution to correlation attack by graduallyincreasing the lengths of initial input bits of linear feedback shift registers (LFSRs). Byincreasing the lengths of LFSRs, which results in increase of the key length, and thenimplement these two generators and analyze their performance. We implemented both thealgorithms and we found that Shrinking Generator is secure at length of 64 andAlternating Step Generator is secure at the length of 128 against the correlation attack.

    Please note that now only one student will participate from Fatima Jinnah WomenUniversity and kindly let me know the procedure for attending the event by one of ourdepartment staff member to accompany the participant.

    Developer:Saria Safdar

    Islamia University, Bahawalpur.

  • 8/8/2019 Abstract Final 2009

    31/41

    31

    Implementation of Open Source IMS (IP Multimedia Subsystem)

    Nowadays, with the development of the next-generation network, IMS becomes very

    important, and it will play a key role in the future All-IP infrastructure. But it is still in

    the developing stage, and it will take time for all 3G mobile networks upgrade to 3GPPnetworks. Therefore, the project will study the implementation of Open Source IMS andinteroperability solutions between Open Source IMS and Open Source VoIP/SIP

    implementations.

    OpenIMS (Open Source IMS) was developed by FOKUS (A German Institution) inDecember 2006. It is a free IMS enterprise solution. As it is so new, there are still many

    doubts about using it. Therefore, it is important to evaluate it. For us, as a starting point,we configure the existing testbed, and then, Wireshark is used to trace the signaling to

    validate the functionality of each component of the OpenIMS.

    The other important task is to find a possible interoperability between OpenIMS andexisting SIP/VoIP enterprise solutions.

    Developers:Shahbaz Ali

    Muhammad FaheemFaisal ur Rehman

    KICSIT, Rawalpindi.

  • 8/8/2019 Abstract Final 2009

    32/41

    32

    APPLICATION / UTILITIES

  • 8/8/2019 Abstract Final 2009

    33/41

    33

    An Interactive Program that Helps to Pass the Driving TheoryTest: Learn Before Drive

    The idea to introduce a interactive Driving Theory Test program is to enhance not onlythe learner driver's perception of the road whilst driving but also as a way in which toincrease the number of good drivers on our roads as well as reducing the number ofdrivers who might have slipped through the test (as in past its not difficult to get adriving license without even giving a formal test).The objectives clearly includeachieving acceptable levels of safety of the driver and other people who are using theroad. Thats the basic purpose to make this interactive driving theory test program.

    The Driving Theory Test Program is aimed to achieve:

    Driver's awareness of traffic signs and regulations The driver's ability to make the right decision on road. A driver's attitude to driving on densely populated roads and on highways. To tell the driver about the importance of his/her own life and the others

    The program should contain all the information important for the person who wants todrive on road. This program contains the info on the highway codes and also the generalrules. Some rules and highway codes are also explained by simple 2d animation tofacilitate the learning process

    The program contains 5 parts

    Signs and Signals, Using the road, Penalties, Self Assessment Safe driving for life.

    Whether civic sense is a blessing or a virtue, it certainly reflects the characteristics of aresponsible nation. But its really hard to accept that we ignore laws that turn others andeven our own lives to peril. Now we cannot possibly take off all the people from road andstart teaching them from the start. But we can take small steps to improve our system.

    The Driving Theory Test product will cover maximum details about driving theory test.The program will be helpful to the new drivers and learners as it help to introduceresponsible driving habits early on in their driving career making them more likely topass their test and enjoy a lifetime of safe driving.

    In an interview with Islamabad traffic police officials we come to know that the previoussystem of driving theory test is nearly going to change in new upgraded touch screencomputerize system. Multiple choice questions are introduced. Minimum 70% of averagewill be required to pass the test. This interactive Driving Theory Test will definitely playa noteworthy role for the beginners who want to pass this new computerize test.

    Developers:Sadaf Fayyaz

  • 8/8/2019 Abstract Final 2009

    34/41

    34

    Fatimah Jinnah Women University Rawalpindi.

    Dream World Code Generator (UML to C# Automatic Code

    Generator)

    Model Driven Approach and automatic code generation from UML diagrams is apromising area. Its benefits include significant reduction in development cost, andminimization of conformance errors between UML diagrams and the code. However, amajor limitation of the existing UML based code generation techniques is that they do notgenerate fully functional and executable code because the code generation techniquesfocus only on generating code for class structure and method call sequence, while objectmanipulations, user interactions and system level coverage are ignored. This is becauseUML does not allow modeling of object manipulations and user interactions. Moreover,the generated code lacks understandability especially in those techniques which use UMLState Machine for creating class hierarchy. In this project we propose an approach to

    automatically generate C# code from UML class, interaction overview, sequence, andactivity diagrams. For this purpose, some extensions have been proposed in UMLdiagrams to allow modeling of object manipulations and user interactions in UMLactivity diagrams. The extensions help in generating complete and executable code. In theproposed approach, UML class diagram is used to create skeleton code in C#, UMLinteraction overview diagram is used to provide flow of control at the system level, UMLsequence diagrams are used to implement control flow between objects, and UMLactivity diagrams are used to implement object manipulations, and user interactions. Thedeveloped tool has been tested by using a case study. The results show that the generatedcode from our tool is more complete and fully executable.

    Developers:Adeel ArifIram Hajira

    University Institute of Information Technology, Pir Mehar Ali Shah, AridAgriculture University.

    Semantic Bees Semantic Profiling Framework for FacilitatingDistributed Collaboration in Scientific Research Communities

    The Research Domain is E-Science that is envisioned to harness the power of Internet tobuild virtual research Communities and thus enabling scientists/researchers to participatein global collaborations. However continuous information explosion of ResearchArtifacts poses a challenge in knowledge representation, its retrieval & discovery. Thisminimizes the interoperability between heterogeneous knowledge resources. To addressthis issue the research proposes a synergy towards e-science and Semantic Web i.e.Semantic Bees - Semantic Profiling Framework for Facilitating Distributed Collaborationin Scientific Research Communities. Semantic web is the evolution of the current webwhere it gives meaning to the content on the web by making the web applications

  • 8/8/2019 Abstract Final 2009

    35/41

    35

    intelligent. It allows a meaningful representation and description of web content makingit machine process able and interpretable. Through inference and reasoning mechanismsof Semantic Web technologies, the data can be shared, integrated, reused and processedby agent based automated tools. The Semantic Bees Framework got its inspiration fromthe intelligent behavior of the bees. Bees are known in nature for their collaboration andcollective intelligence in forming the hive through different food sources. This is

    analogous to our framework where different research communities are like disjointknowledge hives which are envisioned to be interlinked through agents having bee-likeintelligent behavior. The reason why the framework is called semantic bees is becausethese agents are using Semantic Technologies for allowing Distributed Collaboration.The research communities possessing their own data, research works documents andresearchers profiles. So the framework leverages interaction of these disjointcommunities allowing them to collaborate. Through semantic interlinking of data, theknowledge from the research communities is made easily discoverable using reasoningengines and inference mechanisms. The aim of Semantic Bees is to provide a distributedcollaboration to scientific research communities allowing effective knowledge sharing,linking and discovery. The aim of agent rich environment is to ensure an autonomousknowledge discovery for the researcher based on interest and associate researchers ofsimilar interests. The basic features of the agent based framework are Ontological

    knowledge model, Semantic Profiling, Semantic Searching, Linking & Association. Theontological knowledge model is a means for describing the domain concepts. Thepurpose of this modeling is to allow data interoperability and knowledge discoverythrough implicit/explicit reasoning. Semantic profiling, searching and association can bedescribed through a scenario where a researcher is associated with other researchers onthe basis of common interests and expertise level. Linking Module links the SemanticBees framework with distributed knowledge repository for providing a virtualization ofheterogeneous data Repositories such as DBLP through federated queries. Theimplementation of the Framework includes four Basic components: Ontological Model:Describing Semantics of the Research Domain using Owl and the tool Protg,Knowledge Publishing: Either through CVs, Manual Input (filling the frameworks form)or by an html page, Knowledge Reasoning: Description Logic based and Rule-BasedReasoning and Knowledge Retrieval: Retrieving through the Knowledge Base usingSPARQL Queries

    Developers:Sadaf Adnan,Amal TahirKamran Ali

    NUCES, Islamabad

    Semantic Eye

    We have developed a web-based application for UAV images using ASP.Net. Using thisapplication one can store the UAV images, annotate its various regions or objects presentin the images and also comment about the images. All the annotations are stored assemantic metadata so that they are machine interpretable. Finally we have made asemantic-web based search engine for efficiently searching the images on the basis of the

  • 8/8/2019 Abstract Final 2009

    36/41

    36

    semantic metadata of images. For storing the non-semantic data (images, comments etc.)we have used HDF file format. HDF file format is being used by NASA for maintainingsatellite images repository and their metadata.Developers:Kashif Javed

    Muhammad Hussain AshfaqRisham Waqar

    Military College of Signals, Rawalpindi

    Computerized Fault Management System

    Pakistan Telecommunication Company Limited had no computerized system forcomplaint and fault management so it was a big problem to clear the fault, Also acomputerized database of the resources for each telephone exchange was not available so

    it was very difficult for engineers to manage the resources. Computerized FaultManagement System is application software that is multipurpose and it solved many ofexchange related problem. I was assigned the task and requirements for a computerizedsystem to manage the faults and I handed over the software to Taxila Exchange where ithad been used for more than one year during 2007.

    CFMS has following features:

    1. Friendly User Interface having a powerful database management system onbackhand.

    2. Can be used in multiple exchanges.3. Helps in decision making for preventive maintenance.4. Prevent from the duplication of complaint.5. Summary and details of repeated faulty connections.6. Generate and print performance reports and graphs.7. Exact knowledge about resources from exchange to user premises.8. Interruption Card Generation and Printing for each customer.9. Detects the violation of standard operating procedure.

    Developer:Mian Kashif Ali

    University College of Engineering & Technology, the Islamia University ofBahawalpur.

    Media Player Application

    The application is used for entertainment. It plays all the formats of media i.e. .mp3,.mp4, .mpeg and .3gp. It works similar to the Windows Media Player but in a moreadvanced form, as it plays various formats. It is designed in such a way to help usersearch for the media available on that particular machine through the browse dialogue

  • 8/8/2019 Abstract Final 2009

    37/41

    37

    box and it displays only those files with the above mentioned extensions. As the abovestatements indicate it plays both the audio and video applications.

    Developer:Aasma Naureen

    Dept. of ComputerSciences & IT, the Islamia University of Bahawalpur

    MEMVIZ (A Memory Visualization Toolkit)

    In recent times, digital crime has increased exponentially. In order to curb the crime rateand be able to successfully protect and respond to security threats, it is very necessary tocarry out a thorough investigation of crimes scenes. It is essential to gather as muchinformation as possible about the tools and techniques used during the attack. In thecurrent approaches used by digital forensics experts, the hard drives of the compromisedsystems have the highest priority during the investigation. But in recent ages, the

    attackers have come up with more sophisticated techniques of hiding the evidence fromthe expert eyes of the investigators. These hiding techniques involve using the volatilememory as the main residence for malicious code, and leaving no trace of activity on thehard drive. Ignoring RAM is no more an option as critical evidence proving theoccurrence of malicious activity may be lost if not extracted at the right time from theRAM. Current research mainly focuses on RAM analysis of Windows OS basedmachines. But recently the most threatened systems are servers all across the internet,which mainly use Linux based OSes. We propose a software toolkit for Linux basedOSes that would help the investigator to carry out the steps starting from acquisition ofdata from RAM and its visual presentation to an investigator or a normal user.

    Developers:

    M. Shuaib KhanUsman AjmalUsman MushtaqNauman Khalid

    Military College of Signals, Rawalpindi

    S3 (Safety, Security, Service)

    Now days the whole world becomes a global village, every person knows that whathappens at the other end of the world. But no one knows that what happens in his/herhome when he/she is not present there. Therefore, it is time to move forward, and to takehelp of the applications that are offered by Information Technology to provide bettersecurity facilities. The new system will include security & safety systems as well asservices regarding handling appliances. The completion of this project will help the userto avail better and seamless facilities with much lesser resources.

    A fully automated system will help in fast processing of all the information and willprovide additional help to the perspective users to keep their place more secured andintelligent especially when they are not around. The facilities like SMS Alerts will help to

  • 8/8/2019 Abstract Final 2009

    38/41

    38

    remain intact with the place and its security with much ease. Less man power will berequired. User can access the same information from anywhere through internet either bycomputer or mobile. User can control appliances. , send email, send SMS and even canwatch live video of respective building all through web. Hence; it will facilitate the userin a tremendous way.

    Project Objectives

    There will not just be security system but a home automation system aswell.

    The system will provide security through motion detection and sending thealerts to the user via Email and SMS.

    User will be able to watch live video of the respective building through ourproject.

    The system will provide Email and SMS sending facility. It will provide a facility to control electric appliance remotely as well as

    manually. It provides easy record keeping of login history, motion detection, and

    appliance status history.

    Developers:

    Huda AzmatMian Aqeel-Ud-DinFarhanHamid

    KICSIT, Rawalpindi.

    Artillery Tactical Command and Reporting System

    Automatic weapons system has become need of the hour in the present era. Almost all thedeveloping countries are taking keen interest in the future weapons. Weapon technologyhas become very much important in the ongoing situation for all the countries to survive.Especially if you are geographically situated at a place which is important for superpowers of the world and your enemy is upgrading its military in all fields, it becomesmore important to improve your defense system.The Artillery command and fire control system of Pakistan Army is based upon classicArtillery fire control system. This requires a lot of man power. Moreover, the artilleryguns used by Pakistan Army are old and are operated manually. Due to this reason, theaccuracy of our guns is much less than 100%.Our system increases the accuracy of target indication and helps to fire the enemy withbetter accuracy. Communication between all the end users is made faster, secure and

    reliable with the help of networking. Automatic gun control helps reduce human errorand targets can be fired with less wastage of time.

    Developers:Saddam HussainSyed Sameed HussainAtiq Ur Rehman

    College of E&ME

  • 8/8/2019 Abstract Final 2009

    39/41

    39

    Visualization and Implementation OF DES and AES

    Computer network enlarge immensely as tome going on and take the form of internetnetwork of small interconnected networks. Internet provides wide mechanism ofinformation sharing communication channels and modes. As much information share ontoo many channels at the time, and also information may be secrete, the degree ofinterruption is high. The interruption results system hacking, this must be avoided forproper systematic environment. The precaution measures must be taken avoid removeand sustain the system against those unfavorable threats and problems.

    Two most important symmetric key based cryptographic algorithmic standards are to bedeveloped, DES and AES. These two standards provide the mechanism to avoid andsustain against any security threats. These standards work based on secrete key, cipher,input message and output message. DES is broken in real time but AES cannot be.

    My software provides the implementation and Visualization of DES and AES. It securesthe any type of documents, text, audio, video on your personal computer from the illegal

    use. My software uses DES and AES to secure these documents. Moreover it provides thevisualization of AES and DES. Every step of these algorithms is graphically visualizedthat makes the understanding of the algorithms very easy. This project can also be usedfor data security purpose both at the single Personal computer level and duringtransmission in network. It can be used in any application that involves transmission fordata security.

    Developer:M Mazhar Ullah Rathore

    University Of Azad Jammu and Kashmir

    A Semi-Automated Optimal Threat Evaluation and WeaponAssignment Utility for Multi-Air Borne Threats

    Surveillance control and reporting (SCR) system play an important role in the defense ofa country. SCR system corresponds to air and ground situation management/processing

    along with information fusion, communication, coordination, simulation and other criticaldefense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the

    core of a SCR system. TEWA is a complex system that maintains a closed-loopinteraction with a non-deterministic and ever-changing environment. TEWA is generally

    divided into two sub-processes i.e. threat Evaluation (TW) and Weapon Assignment(WA). In such a system, maximal or near maximal utilization of constrained resources is

    of extreme importance. Manual TEWA systems cannot provide optimality because ofdifferent limitations like human vision range constraint and established situational picture

    (limited awareness and information). It is also dependent on an operators experience,observation, understanding of the situation and mental condition. Humans are prone to

    errors especially in stressful conditions, as a consequence, in military domain, whenfacing a real attack scenario; an operator may fail to come up with an optimal strategy to

    neutralize targets. This may cause a lot of ammunition loss with an increased probability

  • 8/8/2019 Abstract Final 2009

    40/41

    40

    of expensive asset damage. The situation is more complex when there are multiplepotential threats. Most semi-automated TEWA systems usually work on target-by-target

    basis using some type of greedy algorithm thus affecting the optimality of the solutionand failing in multi-target scenario. This work presents a decision support based, dynamic

    approach to optimal threat evaluation and defensive resource scheduling. We have

    devised a novel optimization algorithm that provides flexibility and optimality byswapping between two objective functions, based on preferential and subtractive defensestrategies, as and when required.

    Developers:

    Huma Naeem

    Military College of Signals, Rawalpindi

    Fingerprint Based Access Control System

    Commandant, College of Electrical & Mechanical Engineering considering the need ofthe day has assigned and approved the Project Fingerprint Based Access ControlSystem to be immediately installed in the college. The security situation prevailing inthe country demands complete security of Staff and students working in the institute,thereby giving them an environment in which they can study, research and excel in theirdisciplines. The Fingerprint Based Access Control System will be deployed at the collegemain entry gate; laboratorys and class rooms. The system takes fingerprint impression atrun time and compares the same with impression of the data saved in the database andverifies his/her identification. A record/log is also maintained which provides theinformation of timings regarding daily in/out of college staff/employees. Moreover, itwill be used for marking the daily class attendance of college students, hence, making apure and secure attendance system. This system will increase the security status of

    college and would reduce chances of any unauthorized entrance into the college. Secureenvironment with high and excellent quality education is the motto of College ofElectrical & Mechanical Engineering.

    Developers:Samee Ahmed LoneSaad RasheedKashif DurraniShahab Saud

    College of E&ME.

  • 8/8/2019 Abstract Final 2009

    41/41

    Vital Sign: Personal Signature based Biometric authenticationsystem

    Signature is a behavioral biometric: it is not based on the physical properties, such as

    fingerprint or face, of the individual, but behavioral ones. The purpose of project is todevelop an authentication system based on personal signatures. Signature verification is

    an important research topic in the area of biometric verification. In this project the workis done in such a way that the signatures are captured using pen tablet and database of

    100 persons with 15 genuine signatures per person and 5 skilled forgeries per person.The signatures are gathered using 6 features and 1-D Wavelet transform (WT) is

    performed on that features. The Discrete Cosine Transform (DCT) is used to reduce theapproximation coefficients vector obtained by WT to a feature vector of a given

    dimension. Then the classification is performed using Linear programming descriptor(LPD), Simple K-Nearest Neighbor (kNN) and Pruned fuzzy k-Nearest Neighbor

    (Pwfknn).