Final Year Projects 2K6-Computer: Serial # Project List Supervisor
Final Year Projects 2K6-Computer: Serial # Project List Supervisor
Final Year Projects 2K6-Computer: Serial # Project List Supervisor
Supervisor
Page |2 frequently from one position to the other. In this project a human being can control the home electricity system using hand gestures. Algorithms will be developed using different image processing techniques. Deliverables: Software application for hand gestures recognition along with the control hardware. Project Title: Driving Assistance System: Computer Vision based Drowsiness Detection Description: The objective of this project is to design a driving assistance system using computer vision techniques in real time. Driver Fatigue is a significant risk factor in both commercial and private transportation. Every year, hundreds of thousands of drivers, passengers and pedestrians are injured, maimed or killed in road accidents caused by driver drowsiness. Drowsy driver detection systems can help reduce accidents related to drowsy driving. As the eye closure occurrences dramatically increase during the 10-second period preceding an accident, monitoring such closures is a good way to determine drowsiness and prevent the accident. This 10 second range means that the system has to determine if the driver is drowsy in only a few seconds. The algorithm that will be used should not only be fast but effective with as less false alarms (alerting when the driver is awake) and false findings (mistaking other features in the image as eyes) as possible. Deliverables: Software application to detect the driver drowsiness getting input from a CCD Camera. Project Title: Virtual Mouse Engr. Yousaf M. Haroon
Description: Gestures have long been used as a method of communication and are natural method of (Assistant professor) communication. It is reasonable to assume that an access method based on them should be both efficient and intuitive. Virtual mouse is a hand gesture recognition based project. Virtual mouse will be used to interact with the Windows or any other application as a pointing device instead of traditional mouse. System includes a camera that will capture the video of hand, hand pointing and hand gestures will enable users to access the computer. Deliverables: Software application to control mouse movement and control through finger movements.
Page |3 Project Title: UET Traffic Monitoring System Engr. Yousaf M. Haroon
Description: UET traffic monitoring system is a project to monitor the in/out vehicle traffic at UET entrance. (Assistant professor) Vision based system will constantly monitor the incoming and outgoing vehicles at UET gates through cameras. Back end application will detect and recognize the license plates of the vehicles and save the extracted information alongwith the time in the database. This project will benefit the organization to reduce the theft of vehicle or equipment. Deliverables: Software application getting input video from a CCD camera recognizing the license plates of vehicles and updating the database. Project Title: Foot Gesture Controlled Robot / Vehicle Engr. Yousaf M. Haroon
Description: Main idea of this project is to develop a robot, whose movement will be controlled by the human (Assistant professor) feet. Vision based input system will detect the feet of the human being, then to analyze the feet posture and position with respect to orientation and scalability. The respective posture of the feet will decide the robot movements. This application can be used in future for driving assistance systems in automotive industry. Deliverables: A robot/vehicle alongwith software application controlled human feet gestures. Syed Project Title: Implementation of Depth Measurement Engr. Ahmed using Programmable Hardware Sohail
Description & Deliverables: Stereo vision refers to (Assistant professor) the ability to infer information on the 3-D structure of a scene from two or more images taken from different viewpoints. Stereo pairs stand as an imperative source for depth extraction. This thesis describes a system which automatically recovers the depth information by finding the corresponding points between two images; this process of reconstructing the depth from two images is also called binocular stereopsis. My contributions include the development of a system, automation of the complete process, comparison of the stereo matching techniques for measuring disparity maps on MATLAB simulation as well as on Hardware i.e., on BLACKFIN EZ-LITE Kit (ADSPBF561). I have proposed a system which takes the stereo pair as the input and
Page |4 gives estimated relative depth .After testing a number of stereo pairs and comparing them with the ground truth, the experimental results demonstrate that my system approach leads to a system encompassing the state-of-art algorithm, which extracts the depth information Project Title: Measurement Non contact IR Temperature Engr. M. Rizwan (Lecturer)
Description: infrared temperature measurement technology can be utilized successfully in industrial and research settings, and with new innovations to reduce costs and increase reliability, infrared technology has created sensors that offer smaller units of measurement. All of these factors have led infrared technology to become an area of interest for new kinds of applications and users. The advantages offered by noncontact infrared temperature measurement Saving time -- typical infrared temperature measurement takes less than 500 mSec. It can measure temperature of moving targets. Measuring hazardous or inaccessible objects (high-voltage parts, great measurement distance). Measuring high temperatures (greater than ~1300C). There is no energy interference or energy loss. There is no risk of contamination mechanical effect on the target and
Deliverables: Hardware
10
Project Title: Real Time Construction of High Dynamic Engr. M. Rizwan Range Images Using Multiple Sensors (Lecturer) Description: In image processing, computer graphics, and photography, high dynamic range imaging (HDRI or just HDR) is a set of techniques that allow a greater
Page |5
dynamic range of luminance between light and dark areas of a scene than normal digital imaging techniques or photographic prints. Deliverables: construction. Software package for HDR Image
Engr. M. Rizwan
11
Description: Development of algorithms for (Lecturer) reconstructing 3D information from single or multiple 2D images. Deliverables: Algorithm and its implementation in software package for 3D model construction out of 2d images Project Title: Object Detection in Bad Light Engr. M. Rizwan (Lecturer)
12
under surveillance. Using multiple context fusion technique it is to be made possible to look equally well in dark areas where normal imaging equipment does not work to efficiency.
Project Title: Simulation for Crowd management Description: Human crowds are everywhere in the real Engr. M. Rizwan (Lecturer)
13
world, making their simulation a necessity for realistic interactive environments. A real-time crowd model based on continuum dynamics is to be constructed. In our model, a dynamic potential field simultaneously integrates global navigation with moving obstacles such as other people, efficiently solving for the motion of large crowds without the need for explicit collision avoidance. Simulations created with our system run at interactive rates, demonstrate smooth flow under a variety of conditions, and naturally exhibit emergent phenomena that have been observed in real crowds.
Project Title: 3D sketch of university infrastructure Engr. Malik Muhammad Asim using Google sketch up pro. Description: One can visit our complete university (Lecturer) infrastructure while at any remote location. Application will work in the same way as Google earth works.
14
Page |6 Application will be integrated with Google earth in the last phase, so a person using Google earth can see the 3D images of our buildings, lawn, roads, other recourses and the images of the images of the buildings also. Project Title: Wi-Fi positioning system Engr. Malik Muhammad Asim
15
Description: finding a position of node in Wi-Fi network. A device which is accepting signal from (Lecturer) multiple access points, its location is confirmed by the help of signal strengths obtained from different access points.
16
Description: A device supporting GPS/GPRS will be placed in the vehicle and it will update server about its status after some time interval on periodic basis. A students may come on the stop and finding the current location of the university bus of his route from the server. Project Title: Implementation of packet scheduling algorithm in WiMAX, IEEE 802.16
17
Project Description: Its a simulation based project in which WiMAX simulator will have to be developed and packet scheduling algorithms will be implemented to observe the results. OMNET++ or NS-2 are the tools most likely to be used for the simulation purposes.
18
computing devices, such as Laptops, handheld devices and cell phones, as well as recent advances in the wireless communication technologies have motivated
Page |7 researchers to provide novel solutions and applications for the users that were previously not feasible. The users of these mobile computing devices expect the same features and services from these devices as were previously available from conventional desktop computers. However to provide mobility and reduction of size of these mobile devices, the battery life is a major concern; several hardware based techniques have been proposed which results in more energy efficient systems as compared to the earlier systems. Even after these hardware improvement based techniques the problem still persists and it is believed that software based techniques have enough potential to reduce the energy demand to overcome the problems faced due to energy limitation. Deliverables: Real time implementation of the task scheduling algorithm based on the energy constraint of the mobile devices. Project Title: Vehicle Type Identification Engr. Fawad Hussain
19
Description: Vehicle type identification is a kind of (Lecturer) system that counts different types of vehicles and maintain the database. This system can be used in many applications like surveillance, automatic toll tax etc. the system consist of camera that is interfaced to the local PC where the identification process will be done. Deliverables 1) Vehicle Detection 2) Vehicle Identification 3) Vehicle Counting
20
Description: This project is aimed at developing a (Lecturer) packet sniffer on HTTP protocol. This sniffer should be able to monitor and save files transiting over network.
Page |8 This project should be scalable to support other protocols like FTP, POP3 etc. The practical purpose of the project is providing monitoring ability for the administrator of a network. This has to build over any interface provided by freely available libraries for capturing packets on TCP/IP Deliverables: The project should be able to monitor and filter the traffic. Project Title: File transfer Using PSTN Engr. Sana Ziafat Description: Create your own File transfer application (Lecturer) that uses normal PSTN as a medium to send and receive files. For this purpose you will need a modem connected to your PC. Deliverables: An Application that will be able to transfer file using PSTN. Project Title: Development Telephone (SLT) Box of Secure Landline Engr. Mariam Shafqat (Lecturer)
21
22
Description: Now in SLT we wish to secure our communication over the PSTN by employing secure telephony into it. It works by employing secure landline telephone (SLT) box on both the transmitter and receiver side. Whenever any communication is to be started; it first passes through the SLT box; which performs encryption on the transmitted voice. This transmitted data is to sampled at 8KHz sampling rate using 8 bit Pulse Code Modulation (PCM) which is then sent to the central authority i.e. telephone exchange. The telephone exchange employs signalling system (SS7) communication protocol which helps in routing the call to the SLT box on the destination box. On the receiver SLT box; decryption is performed (reverse process of what that was performed on the sender side). After decryption is performed; the receiver listen to the original voice without any fear that their conversation is being trapped or modified on its way to the ultimate destination. Project Title: Wireless Stand-alone Portable Patient Engr. Mariam Shafqat Monitoring System (Lecturer) Description: In this project we have to implement an
23
Page |9 embedded system design that integrates the monitoring of three biomedical parameters into a single personal medical device. The three parameters are: blood glucose level, heart rate, and pulse oximetry. The goal of this work is to build a compact and cost-effective device capable of monitoring several medical parameters while patients conduct their normal daily activities, and store these parameter readings in an embedded system-based portable device. A communication protocol and patient monitoring software application are developed to store data that can be later downloaded to a physicians workstation for analysis and diagnosis. Project Title: RFID Employee access system Engr. Umbreen Sabir Description: The proposed idea for this project is an (Lecturer) application that would utilize RF readers along with RF tags in tracking and logging of hourly employee hours; along with this it would control a mechanical locking mechanism via wireless commands. Employees would have small RF tags that would be read by RF readers and perform the hour logging automatically. The tags would also allow employees access into the building of work or specific area inside the workplace by reading the tags at the entrance and sending commands to the locking mechanism. As employees approach it would unlock the door for a predetermined time period. This of course can be logged as well so the employer keeps track of who is entering or leaving the workplace and the time when it occurs. With this project there are plenty of software components. From programming the interface between the reader and the backend device to parsing and reading the tags, configuring the reader door lock microcontroller system, and so on. An additional software component would be the programming of the locking mechanism. This will involve programming a microcontroller to interact with a locking device such as a servo or solenoid. It would also be needed to program the interface between this software and the RF components so that it would be able to send commands to this mechanical device. Communication will be accomplished using a wireless device such as Bluetooth or WIFI. The other software components would also be the higher-level application that would control this flow, capture, and process the data. The hardware components would be the actual hardware equipment the RFID reader, RFID tags,
24
P a g e | 10 microcontrollers, and the locking mechanism. Deliverables: Upon completion of this project, a prototype system will be there that will recognize and read multiple RF tags from multiple readers, then using this information send commands to a microcontroller to control a mechanical door lock wirelessly. Project Title: Remote vehicle interface Engr. Umbreen Sabir
Description: The RVI Project improves upon (Lecturer) commercially available remote start/keyless-entry systems. In addition to a key-ring transmitter, users can use a telephone or WWW interface to start/kill their vehicles engine or lock/unlock their vehicles doors. The RVI system employs the same amount of security as a traditional key-ring device, but offers far greater range.The components of the project would be:
25
1. 2. 3. 4. 5. 6.
User database Web user interface Phone user interface RF link Microcontroller Remote start
Deliverables: Upon completion of this project, a prototype system will be demonstrated that allows a user to start/kill their engine, lock/unlock their doors, and pop their trunk, all from a much greater distance than current devices allow.
26
Project Title: Cell phone controlled home security Engr. Fatima Naseem system (Lecturer) Description: The proposed idea is an automated security system that the owner monitors himself. This is made possible through the use of a cell phone and a home phone line. The home phone line is used to contact the owner at specified phone numbers in the event of security problems. The phone line and each of the security devices will be interfaced with a
P a g e | 11 microcontroller. The security devices include a door sensor, window sensor, motion sensor, smoke alarm, security keypad, LCD screen, microphones, speaker, and siren. The keypad, LCD screen and one microphone will be mounted together near the door sensor. The microcontroller will be located in a safe place. If the window sensor is tripped while the alarm is armed, the system immediately calls the owner. The smoke sensor will trigger a call to the owner regardless of the armed/unarmed state. If the door sensor is triggered, the microcontroller prompts the keypad near the door for an access code. If a correct code isn't entered within 30 seconds (or whatever time is specified), the owner is called. Further action is determined by user-specified siren logic. Other user options, which can be set via the keypad or phone line, include: edit primary password, add/delete secondary passwords, edit primary phone number, add/delete secondary phone numbers, and set siren logic. The system will also interface with any typical answering system the owner may have. The microcontroller will use a relay to control the answering machine. If the owner calls in and wishes to access the system, they can enter a code. Depending on the validity of the code, the microcontroller will use the relay to enable/disable the answering machine. Deliverables: The final system would interface two microcontrollers with all the security hardware, home phone and cell phone to give the owner full control of the home security system both on-site and remotely.
27
Project Title: A digital wireless video for remote Engr. Fatima Naseem controlled platforms (Lecturer) Description: The basic idea is to display streaming video from an RC helicopter on any IEEE802.11 enabled laptop. This allows the user to experience the flight as if in the cockpit and record a flight from the helicopter's
P a g e | 12 perspective. It would be more portable and user-friendly if the system were configurable to work with a laptop. It's also a whole lot easier to record the video from the flight in a digital format on your laptop. The system would consist of a camera (mounted forward-facing) on an RC helicopter, along with the other modules that manage the wireless transmission of the video from the helicopter to the laptop. These other modules are a microcontroller and wireless transceiver, and they are the only additional hardware necessary (aside from the helicopter, camera, and the laptop) to complete the system. This is because the RC helicopter itself still uses the normal RC radio for its control system, and the laptop uses its normal 802.11 interface to receive the video feed. The microcontroller communicates with the webcam over a standard USB interface and with the wireless transceiver over a standard RS-232 interface. In order to display the video feed, the software on the laptop will provide the necessary functionality to redirect the video feed from the 802.11 interface card to the vendor-supplied Windows driver that comes with the camera. This should allow any camera to be chosen, as long as it has a vendor-supplied Windows driver. By achieving this connectivity, full controllability of the remote camera will be possible from the laptop. This will streamline the process of configuring the camera for a specific resolution and frame rate, as well as the process of displaying and recording the video (because the cameras software can be used). Deliverables: Upon completion of this project, a prototype system will be there that will display streaming video from an RC helicopter on any Windowsbased laptop. Camera, microcontroller, wireless transceiver will be mounted on helicopter and we will have a laptop to view the video.
Project Title: Performance Analysis of Secured Privacy Engr. Afshan Jamil and Key Management Protocol in IEEE 802.16e-2005
P a g e | 13 Description: Security is always the core focus for the (Lecturer) researchers. Mobile WiMAX comes in 2005 and currently adopted by many organizations for broadband access. In this project different security aspects for Mobile WiMAX or IEEE 802.16e-2005 will be analyzed. Numerous and diverse attacks related to authorization key distribution are a direct consequence of the existing susceptibilities in IEEE802.16e-2005. So security enhancement against these attacks and provision of proper authentication to SS (Subscriber Station) is the foremost necessity in mobile network Deliverables: OMNET++ simulator of PKMv2. Project Title: Public Key Encryption with keyword Engr. Afshan Jamil Search (Lecturer) Description: This project considers problem of searching on data that is encrypted using a public key system. Consider a user who sends email to another user encrypted under 2nd users public key. An email gateway wants to test whether the email contains the keyword urgent" so that it could route the email accordingly. 2nd user, on the other hand does not wish to give the gateway the ability to decrypt all her messages. This project defines and constructs a mechanism that enables 2nd user to provide a key to the gateway that enables the gateway to test whether the word urgent" is a keyword in the email without learning anything else about the email. We refer to this mechanism as Public Key Encryption with keyword Search. As another example, consider a mail server that stores various messages publicly encrypted for 2nd user by others. Using our mechanism 2nd user can send the mail server a key that will enable the server to identify all messages containing some specific keyword, but learn nothing else. Deliverables: Omnet++ simulator of keyword search on encrypted data Project Title: Hardware Implementation of Gesture Engr. Naveed Bloach Controlled Robot (Lecturer) Description: This is a kind of robotic car that can move forward, backward, left and right depending on human
28
29
30
P a g e | 14 gestures. The human gestures will be captured via the camera and image will be saved in the computer. After that the images will be processed to recognize the gestures and take actions accordingly. Deliverables Captures the gestures and recognize in the PC Take action for every gesture that is stored in the database Design and develop the robotic car Send the wireless signals to the robotic car Move the robotic car according to the wireless signals from PC Project Title: Hardware Implementation of Embedded IP CCD/CMOS Camera Description: In this project the IP CCD camera will be designed using the Image sensor and the DSP processor. Necessary signals (HYNC and VSYNC) for reading the sensor will be generated using the DSP processor. Image in the form of current read out in analog form and then after conversion into the digital will be processed inside the DSP board and then transmit over the IP. Deliverables Capture the Image from image sensor and store into the memory of SOC Copy the stored image to the PC via USB or via serial interface Send the image to the Network PC Receive the image on the networked PC and store in a particular Place. Engr. Naveed Bloach (Lecturer)
31
32
Project Title: Network/Web based Biometric attendance system Description: This will provide the facility of attendance. Secure attendance based on biometric
P a g e | 15 authentication will be performed in the class rooms and the list of students present in the class will be updated on the server. The system will send this list to the teacher via email and also update the CMS. Deliverables Fingerprint recognition at the class room Attendance of subject send to the server Attendance of that day send to the respective teacher via email Attendance update on the CMS and can be viewed after that class. Project Title: Hardware Implementation of Active/Passive RFID Description: Radio Frequency Identification is a kind of object (Tag) that is used for identification purposes and is a type of contact less identification. This project is the hardware implementation of such system. This will use the microcontroller and RF Transceiver for the implementation. These techniques can be used for the attendance, automatic toll collection etc Engr. Naveed Bloach (Lecturer)
33
Deliverables Selection of RFID components (i.e RF Chip, Microcontroller, antenna) Design the Reader for the RFID Design the Tag (Transponder) for the RFID Protocol for the communication between the Reader and Tag Develop the protocol for removing the packet collision
34
Project Title: Windows secure control using biometric techniques Description The project will be based on biometric
P a g e | 16 identification for secure use of windows i.e. one can login the windows using Biometric techniques (fingerprint matching, face recognition). Biometric techniques can also be used to provide the security of password in different application that will require the fingerprint of the owner to start. (Lock and unlock any directory or drive) Deliverables Fingerprint authentication algorithm Windows (logon, logoff, lock, unlock using the fingerprint matching or face recognition) Lock and unlock different programs Lock and unlock the directories using the fingerprint matching
35
Project Title: Reed Solomon Block Codes (Implementation in MATLAB and on FPGA)
Engr. Shahzadi
Romana
Description: Error Correction codes are a mean of (Lab Engineer) including redundancy in a stream of information bits to allow the detection and correction of symbol errors during transmission. Forward Error Correcting codes are a new class of codes that can achieve exceptional error performance and energy efficiency at low signalto-noise ratio. These codes limit performance. Owing achieve to the a near-Shannon computational
complexity of these FEC codes they are well suited for optimized implementation using custom hardware in FPGA.As this allows us more parallelism and less latency. Reed Solomon Block Codes are non binary cyclic codes used for correcting memory errors, for example errors caused by lightening. They are used in almost every computer and telecommunication system, from CD-
P a g e | 17 ROMs to Deep Space Satellite Communication Systems. Project Title: Viterbi Convolutional Codes Implementation in MATLAB and on FPGA) Engr. Shahzadi Romana
Description: Performs maximum likelihood decoding (Lab Engineer) and reduces the computational load. They are used to
36
eliminate random errors, for example errors introduced by Gaussian White Noise. Their application is in almost every telecommunication and computer system. Students are required to pass the code word from the Gaussian White Noise channel and eliminate the errors resulting from the channel. Project Title: Wireless Lan Security Engr. Nosheena
Description: Today there is huge growing market for (Lab Engineer) wireless LAN but there is black hole associated with
37
networks.This project will cover an overview of major security risks, threats vulnerabilities with Wsystem referencing 802.11b.Tocombat these risks,some this protocol and mechanisms needed to secure Wireless LAN protocol.
38
Project Title: Implementation Of Data Encryption Engr. Nosheena Standard (DES) For Encryption /Decryption On FPGA Description: DES works by encrypting groups of 64 message bits, which is the same as 16 hexadecimal numbers. To do the encryption, DES uses "keys" where are also apparently 16 hexadecimal numbers long or 64 bits long. However, every 8th key bit is ignored in the DES algorithm, so that the effective key size is 56 bits. But, in any case, 64 bits (16 hexadecimal digits) is the round number upon which DES is organized. For example, if we take the plaintext message "8787878787878787", (Lab Engineer)
P a g e | 18 and encrypt it with the DES key "0E329232EA6D0D73", we end up with the cipher text "0000000000000000". If the cipher text is decrypted with the same secret DES key "0E329232EA6D0D73", the result is the original plaintext "8787878787878787". DES is a block cipher--meaning it operates on plaintext blocks of a given size (64-bits) and returns cipher text blocks of the same size. Thus DES results in a permutation among the 2^64 (read this as: "2 to the 64th power") possible arrangements of 64 bits, each of which may be either 0 or 1. Each block of 64 bits is divided into two blocks of 32 bits each, a left half block L and a right half R. (This division is only used in certain operations) Project Title: Digital Design and FPGA Implementation of a Wireless Video Surveillance System Description: The problem with conventional security systems today is that they are mostly wired, meaning the security station must be placed within a fixed distance from the camera. This usually means that the security camera must be placed in a fixed location because it is difficult to move a wire embedded in the wall or ceiling of a building. In order to provide more flexibility, this project aims to implement a wireless security system where image data is sent wirelessly to a receiver station and displayed on the screen. However, in a wireless system where the transfer rate is more restrictive than a wired system, the information must be condensed in some form. Deliverables: ModelSim simulations to test the various modules of the surveillance system Capture, encode, and transmit image Receive, decode, and display the image Project Title: Hardware Implementation of VoIP (SIP) Phone Engr. Waqar Ahmad ( Lecturer CPED)
39
P a g e | 19 Description: An Ethernet hard phone is a self contained IP telephone that looks just like a conventional phone but instead of a conventional phone jack, it has an Ethernet port through which it communicates directly with a VoIP server, VoIP gateway or another VoIP phone. Since a broadband hard phone communicates directly with a VoIP server, VoIP gateway or another VoIP phone it does not require any personal computer nor any software running on a personal computer to make or receive VoIP phone calls. It can be used independently; all that is required is an internet connection. Project Title: PPT Presentation Preparation by PPT Slides extraction from a Video Description: The aim of this project is to develop an application which takes the video presentation/lecture as an input and extract the PPT Slides contents from video presentation/lecture and make a PPT Presentation. Deliverables: PPT Slides contents extraction PPT Presentation preparation using the extracted contents Project Title: FPGA Implementation of Analog Devices Processor with Compiler Description: The FPGA based implementation of Analog Devices DSP processor as well as project aims to develop the Compiler like VisualDSP for this particular FPGA implementation case. Project Title: Laser Pointer Mouse Description: The purpose of this project is to design and implement a laser pointer mouse. The laser pointer mouse allows lecturers and presenters to point at a projected screen, and, with the press of a button, move the mouse cursor to the location of the laser, without ever touching the computer or mouse. A few more buttons allow the user to perform left, right, and double clicks. Deliverables: Detects a laser pointer on a screen Moves the mouse cursor when the laser pointer moves ( Lecturer CPED)
40
41
42
43
P a g e | 20 Project Title: GPRS TELEMETRY SYSTEM, VIDEO Engr. Mona SURVEILLANCE Project Description: In this project a telemetry (Lecturer) system based on embedded computer system is presented, which is designed especially for the need of keeping record of water level in dams to minimize the damages caused by the flood. Data interchange between the monitor center and the terminal via Internet and GPRS is introduced. This system is convenient, portable and high cost-effective and can Tele-monitor for video signals, through GPRS or Internet, which is of great improvement for flood rescue systems in countries facing frequent floods. Deliverable: Our final deliverable will be in hardware form consisting three basic modules GPRS, PROCESSOR and CAMERA. It will be a system with microprocessor in serial facing with GPRS module connected over wireless network; to facilitate telecommunication e.g. capturing images send to server.
44
45
Designing
of
Today, most companies use highly standardized barcode technologies, including UPCs, to identify and track products at an aggregate level through a supply chain. However, bar code technologies have serious limitations, e.g., line-of-site scanning. ]. It is a technology that has been around for more than three decades, and it is still being used by retailers, manufacturers and logistics as a quick and easy way to track inventory. RFID and EPC technologies offer a means to overcome the shortcomings of barcode technologies and provide additional benefits, including item-level (a pallet, a case, a product) identification, tracking, tracing. Item tracking is a historical account of the item from its inception at a manufacturer's location, through various distribution centers, to customer takeoff at point of sale. By knowing where products are, in what quantities, and when and how they're moving, companies achieve enhanced visibility over their operations and supply chains. Greater visibility helps companies 1) reduce stock outs and corresponding lost sales, 2) foster the
P a g e | 21 development of more efficient replenishment processes, and 3) reduce inventory to free precious cash. The RFID initiative is based on the following key principles: Foster the adoption of open-source technology and open standards in the industry and public administration. Contribute to the growth of an ecosystem that may bring business opportunities to industry stakeholders. Structure the initiative as a re-usable process with publication of the underlying principles and processes. Promote alternative ways of thinking with a publication of real-world use-cases and corresponding IT solutions. Share technical expertise, identify technology commons and define best practices that leverage the reuse of open-source components. The discussions within the RFID initiative gives rise to the publishing of their results under the copy left method, every participants being the co-author of those publications. The leader of the initiative proposes thinking and action plans. Deliverable: The final deliverable will be a hardware containing RFID reader and a transponder. The communication between a reader and a transponder will be full duplex through RF link. We will design a specific RF protocol for the communication. A database may also be maintained having EPCs of different tags, so that it can be used to search for specific object.
46
Project Title: Security Provider layer for adhoc networks Description: With the advent of mobile devices in our daily life, the need for more reliable high performance network has increased many folds. Traditional Infrastructure networks provide limited coverage for limited users. On the other hand Ad hoc networks promise greater coverage and rapid deployment. Both types of networks have their limitations. Researchers have proposed the use of Ad hoc with infrastructure networks to reap the benefits of both types. This kind of
The aim of this research is to design a security infrastructure for hybrid networks that will provide a security layer for network aware applications and operating systems of mobile devices owned by the users. The objective is to provide sufficient security to evade intruders into the hybrid networks while keeping the security mechanism as transparent and user friendly as possible.