<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>BET (BUES-FYP)</title>
<link href="http://hdl.handle.net/123456789/10318" rel="alternate"/>
<subtitle/>
<id>http://hdl.handle.net/123456789/10318</id>
<updated>2026-04-04T12:27:33Z</updated>
<dc:date>2026-04-04T12:27:33Z</dc:date>
<entry>
<title>Design and implementation of real-time feasible path planning for uninhabited aerial vehicle (UAV) (P-0395) (MFN 3182)</title>
<link href="http://hdl.handle.net/123456789/1410" rel="alternate"/>
<author>
<name>Yasir Iqbal</name>
</author>
<author>
<name>Imran Hussain</name>
</author>
<author>
<name>Syed Hammad Gillani</name>
</author>
<id>http://hdl.handle.net/123456789/1410</id>
<updated>2021-01-24T04:11:38Z</updated>
<published>2012-01-01T00:00:00Z</published>
<summary type="text">Design and implementation of real-time feasible path planning for uninhabited aerial vehicle (UAV) (P-0395) (MFN 3182)
Yasir Iqbal; Imran Hussain; Syed Hammad Gillani
The Uninhabited Aerial Vehicle (UAV) is used in the surveillance, Agricultural&#13;
industry, military applications, Search and rescue, Pollution monitoring, pipeline&#13;
monitoring &amp; oil gas security. The effective path planning for UAV is design and&#13;
implemented to achieve a collision free path. The goal is to achieve smooth flyable&#13;
path which is done by implementing Bezier and clothoid curve techniques; lately a&#13;
comparison has been made between the two techniques, which are done by using&#13;
Matrix Laboratory (MATLAB) software.&#13;
The main aim is to avoid the UAV from collision; there is be no problem when the&#13;
UAV is moving in a straight line but as it takes turn near the edge of any obstacle it&#13;
will face certain problems. To overcome such problems a Bezier curve method is&#13;
being used, which is the best solution to make the curvature near the edge of any&#13;
obstacle without colliding with the obstacles or resistance. To conclude we can say&#13;
that Bezier curve method is the best solution for the path planning of UAV.&#13;
Previously a clothoid curve method was used for the path planning.
Supervised By Mr.Soyiba Jawed
</summary>
<dc:date>2012-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Image Steganography (P-0394) (MFN 3183)</title>
<link href="http://hdl.handle.net/123456789/1409" rel="alternate"/>
<author>
<name>Faiza Tabassum, 01-133082-054</name>
</author>
<id>http://hdl.handle.net/123456789/1409</id>
<updated>2021-01-24T04:10:17Z</updated>
<published>2012-01-01T00:00:00Z</published>
<summary type="text">Image Steganography (P-0394) (MFN 3183)
Faiza Tabassum, 01-133082-054
The intensification of applications used in World Wide Web has triggered the urge to increase the&#13;
security of data communication over the unsecured internet. Steganography is one of best fit&#13;
techniques to secure the open environment of internet. It is a technique of hiding information within&#13;
every medium that can be expressed in digital form (images, video and audio). Steganography has&#13;
evolved into a practice of concealing information in so that mo one can find the important&#13;
information that is hidden in it.&#13;
In this work, I present a LSB-based steganography technique that accredits to hide encrypted&#13;
version of image into another image while maintaining acceptable image quality, using Matlab.&#13;
Last significant bit is replaces by the algorithm to obscure the data. Visual and attacks on statistics&#13;
is controlled by this algorithm and it provides large capacity of steganography. It will provide a&#13;
mechanism to secure a data from hackers.
Supervised By Mr.Waqar Ahmed
</summary>
<dc:date>2012-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Authentication Mechanism in Wimax (P-0388) (MFN 2474)</title>
<link href="http://hdl.handle.net/123456789/1417" rel="alternate"/>
<author>
<name>Malik Adeel Aamer &amp; Qazi Bilal Amjad</name>
</author>
<id>http://hdl.handle.net/123456789/1417</id>
<updated>2021-01-24T04:01:41Z</updated>
<published>2010-01-01T00:00:00Z</published>
<summary type="text">Authentication Mechanism in Wimax (P-0388) (MFN 2474)
Malik Adeel Aamer &amp; Qazi Bilal Amjad
ABSTRACT&#13;
WiMAX (World wide interoperability for Microwave Access) is a step&#13;
towards 4th generation communication. Wireless communication is&#13;
more vulnerable to attacks such as man in the middle attack,&#13;
jamming, replay and DoS etc. The strength of CCMP algorithm used&#13;
in WiMAX is prone to pre-computation attack as the initial counter is predictable. Packet based challenge response mechanism uses separate encryption key for each packet thus strengthening the security of the connection against unauthorized access by immediately discarding the packet if packet authentication fails. Further, the Nonce and initial counter are not predictable anymore.
Supervised By Mr.Sir Fazal Murtaza
</summary>
<dc:date>2010-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Design and Implementation of Wireless based Distributed Control Units Using Dual mode Channel (IVR-TCS) (P-0389) (MFN 2671)</title>
<link href="http://hdl.handle.net/123456789/1415" rel="alternate"/>
<author>
<name>Ejaz Akhter Shad</name>
</author>
<author>
<name>Zain Tahir</name>
</author>
<id>http://hdl.handle.net/123456789/1415</id>
<updated>2021-01-24T04:03:39Z</updated>
<published>2010-01-01T00:00:00Z</published>
<summary type="text">Design and Implementation of Wireless based Distributed Control Units Using Dual mode Channel (IVR-TCS) (P-0389) (MFN 2671)
Ejaz Akhter Shad; Zain Tahir
The logic is almost same that we used in the previous design. There is only change in the transducer model and also the triggering method of the transmitting transducer. In this logic we are triggering the transmitting transducer with the help of microcontroller. Rest of the process goes the same, the received echo is amplified and given to microcontroller as an interrupt.
Supervised By Mr.Imran Farid Nizami
</summary>
<dc:date>2010-01-01T00:00:00Z</dc:date>
</entry>
</feed>
