Electrical Engineering: Recent submissions

  • Zahoor, Haseeb; Yasin, Talha; Javed, Asad; Anwar, Rafay; Supervised by Fazal (MCS, 2006-05)
    Due to ever-increasing bandwidth demands in future wireless service, the radio frequency band becomes more and more invaluable. In conventional OFDM there is a lot of wastage of bandwidth in the Guard Interval. We aim to ...
  • Butt, Uzair Arshad; Khalid, Muhammad Muneeb; Ali, Babar; Mughal, Muhammad Zahran; Supervised by Dr. Ashraf Masood. (MCS, 2014-06)
    The aim of Project “Designing & Development of Wireless Charging System for Mobile Devices using Electromagnetic Radiation Power” is to transmit power wirelessly to charge the mobile device. It has two major parts, one is ...
  • Doger, Nadir Hassan; Jibrran, Khan; Shah, Rizwan; Supervised by Naveed Sarfraz Khattak (MCS, 2012-06)
    Noise removal is a necessary preprocessing step for speech acquisition in computer telephony and other applications, such as speech-assisted human-machine interfaces. In telephony system, the received signal by the ...
  • Siddiqui, Muhammad Umair; Khan, Muhammad Umar; ul Haq, Rana Ehtesham; Supervised by Ishtiaq Kaiyani. (MCS, 2014-06)
    With countless portable devices easily available such as SD-Cards, CDs, Flash drives and MP3 playersas well as Internet access on nearly every workstation, businesses run an increased risk of data theft by employees and ...
  • Rasheed, Bilal; Naveed, Zohaib; Mohatarem, Zain; Asif, Ali; Supervised by Fazal Ahmed; Supervised by Salman Anwar (MCS, 2005-04)
    We have endeavored to develop an optimal communication system by considering different trade-offs pertinent to the communication system. The design objective is achieved by an acceptable compromise between information ...
  • Rizvi, Syed Ahsaan Panjtan; Khalid, Muhammad Ali; Khokhar, Muhammad Jawad; Aslam, Ahmed Umair; supervised by Asst Prof. Imtiaz Ahmed Khokhar (2010-07)
    Antennas are necessary and critical components of communication and radar systems, but sometimes their inability to adjust to new operating scenarios can limit system performance. In recent years, there has been a growing ...
  • Shoaib Ijaz, Qazi Muhammad; Siddiqui, Muhammad Asif; Abbas Zaidi, Syed Hassan; Supervised by Muhammad Khan Minhas. (MCS, 2014-06)
    Threats to communication systems which have existed since men started sending messages are eavesdropping, modification, replay, masquerading, penetration and repudiation. Implementation of speech secrecy mechanism has ...
  • Naveed, Muhammad Kashif; Ali, Waqar; Khan, M. Yousaf; Ali, Hassan; Supervised by Dr Adil Masood SIddique. (MCS, 2014-06)
    Due to advancement in next generation technologies, humans are being replaced by computers and robots. So, there was a need to automate life so that user can take advantage of the technological advancement in such a way ...
  • Fareed, Amber; Akram, Sehrish; David, Shaleem; Anjum, Shah Nawaz; supervised by Dr. Adnan Rashdi (MCS, 2010-06)
    Wireless Sensor Networks (WSNs) consist of a network of wireless nodes that have the capability to sense a parameter of interest like temperature, humidity, vibration etc that is often relayed to a base station through ...
  • Ahmad, Waqar; Jamil, Usman; Danish, Jibran; Supervised by Dr. Adil Masood Siddiqui. (MCS, 2014-06)
    Trying to balance out between the vehicle speed limit and the protection of driver, the safety mechanism is continuously evolving with improvement in the performance of new vehicle. In view a multi sensor automatic car ...
  • Ali, Ammara; Jameel, Amina; Rashid, Daniyal; Sarwar, Sajjad (MCS, 2005)
  • Sabzwari, Syed Munir Hussain; Owais Ul Haq, Muhammad; Yousaf, Bilal; Nawaz, Asif; supervised by Dr. Adil Masood (MCS, 2010-06)
    In this project a fingerprint based security system has been developed for a department utilizing the Fingerprint verification in order to validate the authorized persons. The image acquisition is done using an optical ...
  • Hussain, Aftab; Awan, Jamal Umair; Asif, Muhammad; Supervised by Dr. Adil Masood. (MCS, 2014-06)
    In the current security environment, our armed forces have to face diverse combat scenarios like Close Quarter Battle (CQB), fighting in Build-Up Areas, Search and Cordon operations. This has led to a need for real time ...
  • Tufail, Atif; Younas, Nadeem; Bajwa, Qasim; Khan, Taseer; Supervised by Dr. Imran Rasheed (MCS, 2004-04)
    The induction of state of the art PATCOMS equipment has revolutionized the communication scenario of Pakistan Army. In field conditions, the importance of provision of vital information to commanders at all level can never ...
  • Maqbool, Hassan; Rehman, Mehmood ur; Nadir, Fahad; Gillani, Umair; Supervised by Imran Rashid; Supervised by Shoab Ahmad Khan (MCS, 2005-04)
    We, in our project, has developed and implemented a new algorithm for modulation identification in ideal channel conditions. This algorithm may be classified in the statistical method category. It has been totally our ...
  • Abbasi, Haider Ali; Younis, Muhammad Rizwan; Habib, Ashar; Khalid, Sikanderr; Supervised by Dr. Naveed Ahmed. (MCS, 2014-06)
    The concept of intelligent UPS is evolved to conserve the precious energy sources. Most of the developing countries are unable to provide electricity to its people either completely or partially. On the other hand, even ...
  • Tariq, Jahangir; Hafeez, Alhan; Ali, Qaisar; Ahmad, Shumail; supervised by Raja Iqbal, Dr Nazar Abbas (MCS, 2009-08)
    The stream cipher A5/2 is used in GSM (Global System for mobile Communication) for authentication and data encryption. There have been numerous successful attacks that were launched on A5/2 hence breaking down its security. ...
  • Abbasi, Hameer; Khan, Aabgeenay; Maamoor, Rida; Azeem, Imran; Supervised by Muhammad Khan Minhan. (MCS, 2014-06)
    A number of interpolation techniques exist that are designed to interpolate data that is sparse in nature over a field to the entire range. These include schemes such as Inverse-Distance Weighting (IDW), Kriging and others. ...
  • Amir, Naila; Manzoor, Saba; Raza, M. Haid; Supervised by Dr. Imtiaz Ahmad Khokhar. (MCS, 2014-06)
    Security is of paramount importance in this world of terrorism. Terrorism has become a major nuisance for all and sundry. Newer and better methods are being explored every day to combat terrorism. The use of remote GSM ...
  • Shaheen, Sabahat; Sattar, Madeeha; Riaz, Saira; Tahir, Mehreen; supervised by Dr. Adnan Rashdi (MCS, 2009-08)
    Optical Loop Tester (OLT) is an opto‐electronic device which implements a specific functionality of Optical Time Domain Reflectometer (OTDR), that is, to 5 detect the location of a cut in the optical fiber using single ...

Search DSpace


Advanced Search

Browse

My Account