Department of Computer Sciences (BUIC-E-8): Recent submissions

  • Irum Bukhari (Computer Sciences, 2003)
    The pUipo~e of this d'ocument is to present an account of the work done thereof in the development of "Galaxy"; an automated and integrated Leaf Buying and Inventory Management System. This system IS presented in partial ...
  • Salman Haider (Computer Sciences, 2003)
    This Software is Drug Index for doctors, which helps them to select a proper medication for the patient keeping in mind drugs efficacy and affordability. Visual Basic 6, ActiveX Data Objects and OLEDB are used in the ...
  • Muhammad Junaid Zafar (Computer Sciences, 2003)
    Entries Expert is a Java GUI component that displays rows and columns of user interactive text, hypertext links, and other Java components in a scrollable window. Entries Expert may be used in conjunction with jbuilder7 ...
  • Anosh Jawaid (Computer Sciences, 2003)
    Developing wmnmg business strategies relies on making informed choices, which requires the availability of reliable, relevant and timely information. The purpose of competitive intelligence analysis is to make sense of. ...
  • Yasar Zaman Kayani, 141022-040 (Computer Sciences, 2003)
    Moving Vehicle Number Plate Recognition System (MVNPR) is application software that automatically extracts the license plate from moving vehicle and then automates the process of recognition. Number Plate Recognition is ...
  • Ovais Mushtaq (Computer Sciences, 2003)
    This document describes JA VA2UML project. The goal of this project was to develop a case tool which is user friendly and can be used for teaching purposes. In JAVA2UML class diagrams are used to generate skeleton code of ...
  • Qaisar Ali (Computer Sciences, 2003)
    Entries Expert is a Java GUI component that displays rows and columns of user interactive text, hypertext links, and other Java components in a scrollable window. Entries Expert may be used in conjunction with jbuilder7 ...
  • M. Arshad Rahim (Computer Sciences, 2003)
    The world is going towards enhancements in the technologies and every one wants· to have more facilities in every field. In the computer world if we look back a few years we will see a world of difference between the ...
  • Zubair Azam (Computer Sciences, 2003)
    All over the world, security 1s an impmiant feature. A sensible cost is spent for implementing security in different organizations. When an organization grows, it entails security with different points of view. Security ...
  • Muhammad Younas (Computer Sciences, 2003)
    Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private tunnel through the public ...
  • Ali Abbas, 244002-001 (Computer Sciences, 2003)
    The PBIGE (Pattern Based Image Generating Engine) is the most sophisticated software that works like a virtual artist as designer. PBIGE standalone windows based Scientist application that has been developed to fill the ...
  • Saima Zaidi (Computer Sciences, 2003)
    Employee Assessment System is developed for the office of Auditor General of Pakistan (AGP). In AGP decisions for the promotion and transfer of civil servants are made after appropriate assessment. This IS done by thoroughly ...
  • Ali Raza Shah (Computer Sciences, 2003)
    Our research base project Technetix Communication is a sponsored project by Technetix communication. It is a big organization who deals in a cable TV equipments. Company was facing many problems to move data from one ...
  • Atif Parvaiz Malik (Computer Sciences, 2003)
    ExpoSoft is Management Information System designed for the Exporters of Pakistan. This is a programming oriented project. This Management Information System allows the owner I exporters to manage their daily routine according ...
  • Zebra Rizvi (Computer Sciences, 2003)
    Identity verification systems are an important part of every day life. Traditional identification systems that involve the use of passwords or cards have chances of lost or stolen. Thus new verification methods have emerged, ...
  • Zia ud Din (Computer Sciences, 2003)
    Identity verification systems are an important par1 of every day life. Traditional identification systems that involve the use of passwords or cards have chances of lost or stolen. Thus new verification methods have emerged, ...
  • Fahad Ahmad, 144001-010 (Computer Sciences, 2003)
    Communication is the basic need of humans. First they had used signals of fire, smoke as transmission mediums to transfer information or to communicate with each others, but with. the passage of time the communication ...
  • Fazal-e- A min (Computer Sciences, 2003)
    Employers received mountains of paperwork in response to advertised job vacancy. To process numerous applications is time consuming and costly. In manual system all the information is kept in the paper files and the ...
  • Hamid Mahmood (Computer Sciences, 2003)
    An automated house over internet is desired. For that, an interface has been developed to connect on the IBM PC/XT compatible bus, to provide a means to control devices through digital and analogue inputs and outputs. ...
  • Nazim Sagheer (Computer Sciences, 2003)
    An automated house over internet is desired. For that, an interface has been developed to connect on the IBM PC/XT compatible bus, to provide a means to control devices through digital and analogue inputs and outputs. ...

Search DSpace


Advanced Search

Browse

My Account