graduation Projects ideas
communication engineer
(graduation final mobile voip security home automation networking planning optimization mobile networks)
2. Data Communication using WiMAX
Communication is a process that
allows organisms to exchange
information by several methods.
(PHY Layer Implementation)
Implementation Communication requires that all
parties understand a common
language that is exchanged. There
are auditory means, such as
speaking, singing and sometimes
tone of voice, and nonverbal,
physical means, such as body
language sign language,
language,
paralanguage touch, eye contact,
paralanguage,
or the use of writing. Here we
implement a WiMAX PHY Layer to
be used in the communication
between two parties.
Prerequisites Objectives Requirements
2009
Digital Circuit Design Study of FPGA Design Two PCs (laptops).
preliminaries. Approach. Serial port comm. Cables.
Mobile Networks Study of WiMAX Basics. FPGA Starter Kit
Fundamentals. Hardware implementation of Interfacing Modules
Digital Communication WiMAX PHY Layer. Wireless Modulators (in case
Fundamentals. System integration to of wireless communication
facilitate the communication between the two parties).
between two parties ((two
PCs)
THE RIGHT WAY TO YOUR CAREER
3. Presently, mobile communications
UMTS Service Multiplexing have the lead in the digital
communications market or a very
advanced position. New services are
increasing due to the rapid growth in
the traffic volume and new users
demands. Thus, future mobile
communication systems will be
distinguished by high integration of
services, flexibility and higher
throughput. To meet these challenges
ƐƚĂŶĚĂƌĚŝnjĂƟŽŶ ďŽĚŝĞƐŝŬĞ ƉƉ
ů ϯŐƉƉ
ϯŐ ŚĂǀĞ
selected the wideband code division
multiple access (WCDMA) and the
hybrid time division – CDMA as the
radio techniques for the universal
o
mobile telecommunication systems
(UMTS).
Prerequisites Objectives Requirements
2009
Digital Circuit Design Study of FPGA Design Keyboard LCD.
preliminaries. Approach. MIC and Speaker.
Mobile Networks Study of WCDMA Basics. FPGA Starter Kit.
Fundamentals. Hardware implementation of Interfacing Modules.
Digital Communication UMTS PHY Layer .
Fundamentals. System integration to
facilitate the communication
between two parties (Data
(
and Voice)
THE RIGHT WAY TO YOUR CAREER
4. The application of code division
CDMA2000 Secure Communication multiple access (
(CDMA) technology
was introduced in cellular systems in
the early 1990s with the de
development
and commercialization of the IS-95
standard. Since then, the technology
has been widely deployed throughout
the world, reaching the 180 million
subscriber mark in late 2003. Since its
commercialization, the CDMA
technology has evolved from IS
chnology IS-95 to
CDMA
CDMA2000 and beyond with
significant enhan
enhancements in voice
capacity, data speed, and network
features. CDMA2000 is the 3G Radio
Transmission Technology (RTT)
proposal submitted by Telecoms
Industry Association (TIA).
Prerequisites Objectives Requirements
2009
Digital Circuit Design Study of FPGA Design Keyboard LCD or Serial Port
preliminaries. Approach. comm. cables (RS232).
Mobile Networks Study of CDMA Basics. FPGA Starter Kit.
Fundamentals. Study of AES Encryption. Interfacing Modules
Digital Communication Hardware implementation of
Fundamentals. the Reverse Traffic Channel
Channel.
System Integration to
facilitate secure comm.
between two parties
parties.
THE RIGHT WAY TO YOUR CAREER
5. Data that can be read and understood
Advanced Data Encryption without any special measures is called
plaintext or cleartext. The method of
Using FPGA
disguising plaintext in such a way as to
hide its substance is called encryption.
Encrypting plaintext results in
unreadable gibberish called ciphertext.
You use encryption to make sure that
information is hidden from anyone for
whom it is not intended, even those
who can see the encrypted data. The
process of reverting ciphertext to itits
original plaintext is called decryption.
Cryptography is the science of using
mathematics to encrypt and decrypt
data. Cryptography enables you to
store sensitive information or transmit
it across insecure networks (like the
Internet) so that it cannot be read by
b
anyone except the intended recipient.
Prerequisites Objectives Requirements
2009
Digital Circuit Design Study of FPGA Design Two PCs (Laptops).
preliminaries. Approach. Serial Port comm. cables.
Information Theory Study of Cryptography Basics. FPGA Starter Kit.
Fundamentals. Study of AES DES and RC4
AES, Interfacing Modules
Digital Communication Encryption Algorithms.
Fundamentals. Hardware implementation of
Encryption Modules
Modules.
System Integration to
facilitate data security.
THE RIGHT WAY TO YOUR CAREER
6. Mobile Home Automation
Home automation is a modern
technology that puts security and
convenience right into your own home. In
other words, home automation is a
system that gives homeowners the ability
to take charge and control electronic
devices even if they are not physically at
home. Many o us are amazed at high-
of
tech gadgets and automated machines
highlighted in movie films. With today’s
technology, the things that we see in the
movies are no longer impossible. Imagine
this, if you happen to forget to turn off
your air conditioner. You can turn it off
with a home automation system even if
you are already at the office. You
wouldn’t even miss your favorite TV
series. You can record it even if you are
oceans away from your home.
Prerequisites Objectives Requirements
2009
Digital Circuit Design Study of FPGA Design Two Cellular Mobiles.
preliminaries. Approach. Mobile comm. cable.
Mobile Networks Study of Mobile Modem AT AT- FPGA Starter Kit.
Fundamentals. Commands Basics.
Basics Sensors and Actuators.
Digital Communication Hardware implementation of Interfacing Modules
Fundamentals. Mobile Interfacing Modules.
System Integration to
facilitate communication with
mobile to control the circuits.
THE RIGHT WAY TO YOUR CAREER
7. Multimedia Steganography
Nowadays, information is rapidly
available through the Internet.
Companies have the ability to
communicate with a worldwide audience
through the World Wide Web. So
Information hiding techniques are
received increasing attention due to the
availability of multimedia and digital form
objects and the need to present solutions
to criminal copying and copyright
problems. As we know, cryptography and
Steganography have been known for
many years. We can encrypt data, but it
will be exposed while transferring. On the
other hand, we can hide data into a
common object, but if someone extracts
it, he/she can get the information easily.
Therefore, my idea is to apply bot of
both
them, so in case one gets the embedded
stuff; s/he will face an encrypted data.
Prerequisites Objectives Requirements
2009
Digital Circuit Design Study of Visual Basic .NET. Two PCs (Laptops).
preliminaries. Study of Cryptography Basics. Serial Port comm. cables.
Information Theory Study different Encryption Visual Basic .NET.
Fundamentals. Methods and Steganography.
Programming Fundamentals. Software implementation of
Encryption Modules.
Software implementation of
Data Hiding Modules.
THE RIGHT WAY TO YOUR CAREER
8. Before the modern era, cryptography was
Software Data Encryption concerned with message confidentiality
(i.e., encryption) — conversion of messages
from a comprehensible form into an
incomprehensible one, and back again at
the other end, rendering it unreadable by
interceptors or eavesdroppers without
secret knowledge (namely, the key needed
for decryption of that message). In recent
decades, the fie has expanded beyond
field
confidentiality concerns to include
techniques for message integrity checking,
sender/receiver identity authentication,
digital signatures interactive proofs, and
signatures,
secure computation amongst others.
computation,
ƐƐĞŶƟĂůLJ͕ƉƌŝŽƌ ƚŚĞ LJ
ů ƚŽ ĞĂƌů ϮϬƚŚ ĐĞŶƚƵƌLJ͕
cryptography was chiefly concerned with
linguistic patterns. Since then the emphasis
has shifted, and cryptography now makes
extensive use of mathematics, including
aspects of information theory,
computational complexity statistics,
complexity,
abstract
abstrac algebra, and number theory.
Prerequisites Objectives Requirements
2009
Digital Circuit Design Study of Visual Basic .NET.
.NET Two PCs (Laptops).
preliminaries. Study of Cryptography Basics. Serial Port comm. cables.
Information Theory Study different Encryption Visual Basic .NET.
Fundamentals. Algorithms and their related
Programming Fundamentals. Statistical Tests
Tests.
Software implementation of
Encryption Modules.
Software implementation of
Statistical Testing Modules.
THE RIGHT WAY TO YOUR CAREER