Matlab Code for Amplitude Modulation

 Program:


clc;

clear all;

t = 0:0.001:1;

vm = input('Enter the amplitude of message signal = ');

vc = input('Enter the amplitude of carrier signal = ');

fm = input('Enter the message frequency = ');

fc = input('Enter the carrier frequency = ');

m = vm/vc;

sm = vm.*sin(2*pi*fm*t);

subplot(3,1,1);

plot(t,sm);

xlabel('Time ---->');

ylabel('Amplitude ---->');

title('Message Signal');

grid on;

sc = vc.*sin(2*pi*fc*t);

subplot(3,1,2);

plot(t,sc);

xlabel('Time ---->');

ylabel('Amplitude ---->');

title('Carrier Signal');

grid on;

y = (vm+m*vm.*sin(2*pi*fm*t)).*sin(2*pi*fc*t);

subplot(3,1,3);

plot(t,y);

xlabel('Time ---->');

ylabel('Amplitude ---->');

title('AM Signal');

grid on;


Output:

Enter the amplitude of message signal = 5

Enter the amplitude of carrier signal = 10

Enter the message frequency = 10

Enter the carrier frequency = 100

Output Waveforms:



Share:

Matlab Code for Phase Modulation

 Program:


clc;

clear all;

t = 0:0.001:1;

vm = input('Enter the amplitude of message signal = ');

vc = input('Enter the amplitude of carrier signal = ');

fm = input('Enter the message frequency = ');

fc = input('Enter the carrier frequency = ');

m = input('Enter modulation index = ');

sm = vm*sin(2*pi*fm*t);

subplot(3,1,1);

plot(t,sm);

xlabel('Time ---->');

ylabel('Amplitude ---->');

title('Message Signal');

grid on;

sc = vc*sin(2*pi*fc*t);

subplot(3,1,2);

plot(t,sc);

xlabel('Time ---->');

ylabel('Amplitude ---->');

title('Carrier Signal');

grid on;

y = vc*sin(2*pi*fc*t+m.*sin(2*pi*fm*t));

subplot(3,1,3);

plot(t,y);

xlabel('Time ---->');

ylabel('Amplitude ---->');

title('PM Wave');

grid on;


Output:


Enter the amplitude of message signal = 5

Enter the amplitude of carrier signal = 5

Enter the message frequency = 10

Enter the carrier frequency = 100

Enter modulation index = 4


Output:



Share:

Matlab Code for Pulse Code Modulation

 Program:


clc;

clear all;

t = 0:0.0005:20;

partition = -1:0.1:1;

codebook = -1:0.1:1.1;

x = sin(t);

[index,quants] = quantiz(x,partition,codebook);

subplot(3,1,1);

plot(t,x);

title('Message Signal');

xlabel('Time(s) ---->')

ylabel('Amplitude(V) ---->')

subplot(3,1,2);

plot(t,quants);

title('Quantized Signal');

xlabel('Time(s) ---->')

ylabel('Amplitude(V) ---->')

y = uencode(quants,3);

subplot(3,1,3);

plot(t,y);

title('PCM Signal');

xlabel('Time(s) ---->');

ylabel('Amplitude(V) ---->')


Output: 



Share:

Matlab Project Topic List for Final Year Submission

 RECONSTRUCTION OF UNDERWATER IMAGE BY BISPECTRUM

DESIGN AND ANALYSIS OF BIT INTERLEAVED CODED SPACE-TIME MODULATION

CODING SCHEMES APPLIED TO PEAK-TO-AVERAGE POWER RATIO (PAPR) REDUCTION IN OFDM SYSTEMS

DETECTING DOMINANT MOTIONS IN DENSE CROWDS

A REAL-TIME ADAPTIVE LEARNING METHOD FOR DRIVER EYE DETECTION

DROP PARAMETER ESTIMATION FROM UNDERWATER NOISE PRODUCED BY RAINDROP IMPACT

EFFICIENT SPATIAL COVARIANCE ESTIMATION FOR ASYNCHRONOUS CO-CHANNEL INTERFERENCE SUPPRESSION IN MIMO-OFDM SYSTEMS

FAST AND EFFICIENT QOS-GUARANTEED ADAPTIVE TRANSMISSION ALGORITHM IN THE MOBILE WIMAX SYSTEM

DISCOV: A FRAMEWORK FOR DISCOVERING OBJECTS IN VIDEO

FUZZY LOGIC BASED EDGE DETECTION

FUZZY BASED PID CONTROLLER USING MATLAB FOR TRANSPORTATION APPLICATION

APPLICATION OF SUPPORT VECTOR MACHINE AND GENETIC ALGORITHM FOR IMPROVED BLOOD CELL RECOGNITION

DESIGN OF A DISTRIBUTED TRAFFIC MONITORING SYSTEM AND ALGORITHM BASED ON WEBCAMERA

AN IMPROVING MODEL WATERMARKING WITH IRIS BIOMETRIC CODE

AN EFFICIENT HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCRETE WAVELET TRANSFORM

A NEW STATISTICAL DETECTOR FOR DWT-BASED ADDITIVE IMAGE WATERMARKING USING THE GAUSS–HERMITE EXPANSION

A HISTOGRAM MODIFICATION FRAMEWORK AND ITS APPLICATION FOR IMAGE CONTRAST ENHANCEMENT

A MULTICODE APPROACH FOR HIGH DATA RATE UWB SYSTEM DESIGN

ULTRA-WIDE-BAND PROPAGATION CHANNELS

PERFORMANCE OF CDMA

OBJECT RECOGNITION USING EUCLIDEAN DISTANCE WITH KNN ALGORITHM

ROBUST IMAGE SEGMENTATION ALGORITHM USING FUZZY

PERSONAL AUTHENTICATION BASED ON IRIS TEXTURE ANALYSIS

A TOKEN-BASED SCHEDULING SCHEME FOR WLANS SUPPORTING VOICEDATA TRAFFIC AND ITS PERFORMANCE ANALYSIS

ADAPTIVE RADIO RESOURCE ALLOCATION FOR DOWNLINK OFDMASDMA SYSTEMS WITH MULTIMEDIA TRAFFIC

COOPERATIVE MIMO-BEAMFORMING FOR MULTIUSER RELAY NETWORKS

DUCHA A NEW DUAL-CHANNEL MAC PROTOCOL FOR MULTIHOP AD HOC NETWORKS

EFFICIENT POWER ALLOCATION FOR CODED OFDM SYSTEMS

MCMAC A PARALLEL RENDEZVOUS MULTI-CHANNEL MAC PROTOCOL

POWER ALLOCATION FOR TWO DIFFERENT TRAFFICS IN LAYERED MIMO SYSTEMS

SEMISOFT HANDOVER GAIN ANALYSIS OVEROFDM-BASED BROADBAND SYSTEMS

SEQUENTIAL DETECTION FOR MULTIUSER MIMO CDMA SYSTEMS WITH SINGLE SPREADING CODE PER USER

A MEDIUM ACCESS CONTROL SCHEME FOR TDD-CDMA CELLULAR NETWORKS WITH TWO-HOP RELAY ARCHITECTURE

A NEW PARAMETER FOR UWB INDOOR CHANNEL PROFILE IDENTIFICATION

VARIANCE-REDUCED PARTIAL PARALLEL INTERFERENCE CANCELLATION FOR MC-CDMA UPLINK SYSTEMS

MEASUREMENT BASED CHANNEL-ADAPTIVE VIDEO STREAMING FOR MOBILE DEVICES OVER MOBILE WIMAX

IEEE 802.16/WIMAX SECURITY

BIOMETRICS SECURITY IN WIMAX

DISTRIBUTED SUPPLY CHAIN MANAGEMENT USING ANT COLONY OPTIMIZATION

A CLOSED-FORM BLIND CFO ESTIMATOR BASED ON FREQUENCY ANALYSIS FOR OFDM SYSTEMS

BANDWIDTH EXCHANGE: AN ENERGY CONSERVING INCENTIVE MECHANISM FOR COOPERATION

EFFICIENT POWER ALLOCATION FOR CODED OFDM SYSTEMS

PERFORMANCE ANALYSIS OF DISTRIBUTED DECISION FUSION USING A CENSORING SCHEME IN WIRELESS SENSOR NETWORKS

NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING AND ROUTING IN WIRELESS SENSOR NETWORKS

PERFORMANCE ANALYSIS OF MULTI-CARRIER DS-CDMA WIRELESS COMMUNICATION SYSTEM

SPEECH ENHANCEMENT USING HARMONIC EMPHASIS AND ADAPTIVE COMB FILTERING

A FAULT TOLERANT COMMUNICATION ARCHITECTURE SUPPORTING CRITICAL MONITORING WITH WIRELESS SENSOR NETWORKS

COOPERATIVE SENSING FOR PRIMARY DETECTION IN COGNITIVE RADIO

AUDIO CODING USING A PSYCHOACOUSTIC PRE- AND POST-FILTER

TIME-DOMAIN SIGNAL DETECTION BASED ON SECOND-ORDER STATISTICS FOR MIMO-OFDM SYSTEMS

·      A Hybrid Time Divisioning Scheme for Power Allocation in DMT-Based DSL Systems

·      A New Dual-Channel Mac Protocol for Multihop Ad Hoc Networks

·      A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks

·      Adaptive Routing in Dynamic Ad Hoc Networks

·      Analysis of IEEE 802.11e for Delay Sensitive Traffic In Wireless Lans

·         •

·      Backup Path Set Selection in Ad Hoc Wireless Network using Link Expiration Time

·         •

·      Call Admission Control Optimization in Wimax Networks

·         •

·      Code Shift Keying Impulse Modulation for Uwb Communications

·         •

·      Contention-Based Qos Mac Mechanisms for Vbr Voip In Ieee 802.11e

·         •

·      A Medium Access Control Scheme for Tdd-Cdma Cellular Networks With Two-Hop Relay

·      Architecture

·         •

·      A New Parameter for Uwb Indoor Channel Profile Identification

·         •

·      Novel Channel Interference Reduction In Optical Synchronous Fsk-Cdma Network using a

·      Data-Free Reference

·         •

·      Performance Improvement in Wireless Networks using Cross-Layer Arq

·         •

·      Performance of Optical Burst Switched Networks for Grid Applications

·         •

·      Power Allocation and Scheduling for Ultra-Wideband Wireless

·         •

·      Networks

·         •

·      An Efficient Data Extraction Mechanism for Mining Association Rules From Wireless Sensor

·      Networks

·         •

·      An FPGA-Based Architecture for Real Time Image Feature Extraction

·         •

·      An Improving Model Watermarking with Iris Biometric Code

·         •

·      Automatic Recognition of Exudative Maculopathy using Fuzzy Cmeans Clustering and

·      Neural Networks

·         •

·      Reconstruction of Underwater Image by Bispectrum

·         •

·      Hierarchical Contour Matching for Dental X-Ray Radiographs

·         •

·      Robust Image Watermarking Based On Multiband Wavelets and Empirical Mode

·      Decomposition

·         •

·      Image Segmentation using Iterative Watersheding Plus Ridge Detection

·         •

·      Real-Time System for Monitoring Driver Vigilance

·         •

·      Robust Dwt-Svd Domain Image Watermarking:Embedding Data in all Frequencies

·         •

·      Optimized Software Implementation of A Full-Rate IEEE 802.11a Compliant Digital Base band

·      Transmitter on a Digital Signal Processor

·         •

·      Active Noise Cancellation with a Fuzzy Adaptive Filtered-X Algorithm

·         •

·      Design and Analysis of Bit Interleaved Coded Space-Time Modulation

·         •

·      Non-Symmetric Decompanding for Improved Performance of Companded ofdm Systems

·         •

·      Implementation of IEEE 802.11 a Wlan Baseband Processor

·         •

·      Signal Adaptive Subband Decomposition for Adaptive Noise Cancellation

·         •

·      A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks

·         •

·      Analysis of IEEE 802.11e for Delay Sensitive Traffic in Wireless Lans

·         •

·      Backup Path Set Selection in Ad Hoc Wireless Network using Link Expiration Time

·         •

·      Performance Improvement in Wireless Networks using Cross-Layer ARQ

·         •

·      Fingerprint Recognition System for FingerCode based

·         •

·      Face Recognition System

·         •

·      Speech Recognition System for isolated words

·         •

·      Recursive Gabor Filtering for 1D and 2D signals

·         •

·      Photorefractive Simulator System for calculating the vector space-charge field induced by

      the Photorefractive effect.


DCT-based Watermarking for grayscale images

Wavelet-based Watermarking grayscale images

Iris Recognition System

Speaker Recognition System

Adaptive Equalizer

Advance Digital Signal Processing Graphics Compression

Audio Signal Processing

Channel Tracking using using Kalman Filter

Deriving Intrinsic Images from Image Sequences

Digit Recognition

Effect of equalization on a QAM based modulation scheme

Gesture Recognition

High Performance Implementation of MPEG-1 Layer 3 Audio

Human Hearing Threshold from EEG Signals using Neural Network

Image and Sound Compression using Wavelet

JPEG, motion compensation, MPEG-1, MPEG-2

License plate Recognition / Number Plate recognition

Power Spectrum Estimation Periodogram & Modified Periodogram

Quadrature Amplitude Modulation (M-QAM Implementation)

Recognition of Brain Tissues & Coloring of Magnetic Resonance Images

Coding of stereoscopic images - wavelet domain techniques

Compression, Predictive, Transform, Quantization

Car Thefts Detection

Content-Based Image Retrieval

Share:

C program to display the following pattern of numbers

 1

1    2

1    2    3

1    2    3    4

1    2    3    4    5

1    2    3    4    5    6

1    2    3    4    5    6    7


Program code

#include <stdio.h>

#include <conio.h>

void main()

{

int inner, outer, rows=1;

clrscr();

printf(“How many rows do you want to see? \n”);

scanf(“%d”, &rows);

printf(“The pattern is displayed below.\n”);

for (outer=1;outer<=rows;outer++)

{

for (inner=1;inner<=outer;inner++)

printf(“%d\t”,inner);

printf(“\n\n”);

}

getch();

}


Example of output

How many rows do you want to see?

7

The pattern is displayed below.

1

1    2

1    2    3

1    2    3    4

1    2    3    4    5

1    2    3    4    5    6

1    2    3    4    5    6    7

Share:

C program to display the following pattern

 *

*    *

*    *    *

*    *    *    *

*    *    *    *    *

*    *    *    *    *    *

*    *    *    *    *    *    *


Program code

#include <stdio.h>

#include <conio.h>

void main()

{

int inner, outer, rows=1;

clrscr();

printf(“How many rows do you want to see? \n”);

scanf(“%d”, &rows);

printf(“The pattern is displayed below.\n”);

for (outer=1;outer<=rows;outer++)

{

for (inner=1;inner<=outer;inner++)

printf(“*\t”);

printf(“\n\n”);

}

getch();

}


Example of output

How many rows do you want to see?

7

The pattern is displayed below.

*

*    *

*    *    *

*    *    *    *

*    *    *    *    *

*    *    *    *    *    *

*    *    *    *    *    *    *

Share:

C program to check whether the given number is odd or even

 Program code

#include <stdio.h>

#include <conio.h>

void main()

{

int a;

clrscr();

printf("Please input a number to find whether it is odd or even.\n");

scanf("%d",&a);

if ((a%2)==0)

printf("%d is even.\n",a);

else

printf("%d is odd.\n",a);

getch();

}


Example of output

Please input a number to find whether it is odd or even.

700

700 is even.

Share:

C program to find whether the given number is prime or composite

 Program code

#include <stdio.h>

#include <conio.h>

void main()

{

int question=0, i=2;

clrscr();

printf(“Please input a positive integer to find out whether it is a prime number or composite number.\n”);

scanf(“%d”,&question);

if (question==1)

{

printf(“%d is neither prime nor composite.\n”, question);

goto stop;

}

if (question==2)

{

printf(“%d is a prime number.\n%d is the only even prime number.\n”,question,question);

goto stop;

}

do

{

if (question%i==0)

{

printf(“%d is a composite number.\n”,question);

goto stop;

}

i++;

}

while(i<question);

printf(“%d is a prime number.\n”,question);

stop:

getch();

}


Example of output

Please input a positive integer to find out whether it is a prime number or composite number.

3

3 is a prime number

Share:

C program to display the reverse of the given number

 Program code

#include <stdio.h>

#include <conio.h>

void main()

{

long int temp=0, number=0, reverse=0;

clrscr();

printf(“Please input a whole number to get its reverse.\n”);

scanf(“%ld”,&number);

for (temp=number;temp>0;temp=temp/10)

reverse=(reverse*10)+(temp%10);

printf(“The reverse of %ld is %ld\n”, number, reverse);

getch();

}


Example of output

Please input a whole number to get its reverse.

6754

The reverse of 6754 is 4576

Share:

C program to swap two numbers

 Program code

#include <stdio.h>

#include <conio.h>

void main()

{

int a=0, b=0, temp=0;

clrscr();

printf(“Please input a number to store in a.\n”);

scanf(“%d”,&a);

printf(“Please input a number to store in b.\n”);

scanf(“%d”,&b);

printf(“Before swapping.\na=%d\nb=%d\n”, a,b);

/*displays the values of a and b before swapping.*/

/* swapping starts */

temp=a;

a=b;

b=temp;

/*swapping ends*/

printf(“After swapping.\na=%d\nb=%d\n”, a,b);

/*displays the values of a and b after swapping.*/

getch();

}


Example of output

Please input a number to store in a.

98

Please input a number to store in b.

34

Before swapping.

a=98

b=34

After swapping.

a=34

b=98

Share:

C program to print a fractional number after rounding it to two decimal places

Program code

#include <stdio.h>

#include <conio.h>

void main()

{

float a;

clrscr();

printf("Please insert a number.\n");

scanf("%f",&a);

printf("The number you have entered is %.2f",a);

getch();

}


Example of output

Please insert a number.

7.7777

The number you have entered is 7.78 

Share:

MATLAB Code for Histogram Equalization

 The process of adjusting intensity values can be done automatically using histogram equalization. Histogram equalization involves transforming the intensity values so that the histogram of the output image approximately matches a specified histogram. By default, the histogram equalization function, histeq, tries to match a flat histogram with 64 bins, but you can specify a different histogram instead.




Share:

Matlab Project On Types of Breast Cancer Detection Using Matlab Source Code

  ABSTRACT

            Cancer is the second cause of death in the world. 8.8 million patients died due to cancer in 2015. Breast cancer is the leading cause of death among women. Several types of research have been done on early detection of breast cancer to start treatment and increase the chance of survival. Most of the studies concentrated on mammogram images. However, mammogram images sometimes have a risk of false detection that may endanger the patient’s health. It is vital to find alternative methods which are easier to implement and work with different data sets, cheaper and safer, that can produce a more reliable prediction. This project we proposes a model of Machine Learning (ML) algorithms including Support Vector Machine (SVM). Here it also detect types of Breast Cancer in different categories like NORM=Normal, CALC=Calcification, CIRC=Circumscribed Masses, SPIC=Speculated Masses, MISC=ill-defined Masses, ARCH=Architectural Distortion, ASYM=Asymmetry.

PROJECT OUTPUT


PROJECT VIDEO

Contact:
Mr.Roshan P. Helonde
Mobile: +91-7276355704
WhatsApp: +91-7276355704
Email: roshanphelonde@rediffmail.com
Share:

Matlab Project for DCT Based Steganography Hide Text in Image Source Code

 ABSTRACT

            Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding. Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this project the secret message is encrypted first then DCT technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain.  DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image

PROJECT OUTPUT


PROJECT VIDEO

Contact:
Mr. Roshan P. Helonde
Mobile: +91-7276355704
WhatsApp: +917276355704
Email: roshanphelonde@rediffmail.com
Share:

DES Encryption Decryption Using Matlab Project Source Code - Cryptography Using DES Algorithm

  ABSTRACT

            The data encryption standard is also known as DES. DES has been the most extensively used encryption algorithm standard in recent times. Encryption and decryption comprise of cryptography. Cryptography terminology is used in the data encryption standard along with standard algorithm to hide the original text. DES applies the cipher algorithm to each data block. Data encryption is being used to hide the true meaning of data so that it is very hard to attack or crack. This project deals with the simulation and synthesis results of implemented DES algorithm. Analysis of implementation is shown in step by step process. A test case is analyzed step by step to check the results at each step of the algorithm.

PROJECT OUTPUT


PROJECT VIDEO

Contact:
Mr. Roshan P. Helonde
Mobile: +91-7276355704
WhatsApp: +917276355704
Email: roshanphelonde@rediffmail.com
Share:

Popular Posts

Contact Form

Name

Email *

Message *

Recent Posts

Copyright Matlab Project Codes All rights Reserved. Powered by Blogger.

Blog Archive