Department of Computer Sciences (BUIC-E-8): Recent submissions

  • Muhammad Atif Zaman, 01-243162-002 (Bahria University Islamabad Campus, 2019)
    Lung Cancer is chronic disease causing death for human beings in almost all over the world. The identification of disease nature and response to treatment differs widely among patients. Thus it is very important to detect ...
  • Anmol Hamid (Bahria University Islamabad Campus, 2019)
    Dating historical manuscripts is a challenging task for historians and paleographers that requires specialized knowledge of scripts and writing styles, writing instruments and types of papers etc. During the last two ...
  • Maryam Bibi (Bahria University Islamabad Campus, 2019)
    In recent years, identifying source printers has gained immense popularity for forgery detection. Paper employed for agreements and contracts have greater significance and to detect forgery among these papers validates the ...
  • Khadija Khan, 01-243162-004 (Bahria University Islamabad Campus, 2019)
    Leukemia is the cancer that starts in the blood cells due to the excess production of immature leucocytes that replace the cells with normal blood cells. Physicians rely on their experience to determine the type and subtype ...
  • Masooma Zahra, 01-243171-010 (Bahria University Islamabad Campus, 2019)
    The amount of information on the internet is growing rapidly and searching relevant content is center of concern nowadays. With the growing demand for relevant search results, it is important to introduce an approach which ...
  • Tasneem Aslam, 01-243171-035 (Bahria University Islamabad Campus, 2019)
    Software define networking relies on decoupling of data plane and network plane. Software define Wireless Network defines how networking and computing system can be form using a combination of open software, home engineering ...
  • Faima Abbasi, 01-243171-004 (Bahria University Islamabad Campus, 2019)
    Social network analytics is an important research area and attracts a lot of attention from researchers. A social network has graph based topology having vertices V relating to users and edges £ relating to links or ...
  • Sajid Anwar, 01-245171-017 (Bahria University Islamabad Campus, 2019)
    From recently, the innovative technology named as Constrained Application Protocol (CoAP) has been classified for numerous sensors in the field of IoT. Service discovery should be performed again in CoAP to support handover ...
  • Muhammad Zeshan Qurashi, 01 -245171-014 (Bahria University Islamabad Campus, 2019)
    In WBAN, large numbers of sensors are deployed inside and outside of human body. People with the chronic disease require long-term hospitalization. To avoid from longerm hospitalization. WBAN is the ideal way. Main objective ...
  • Muhammad Mahdi, 01-245171-010 (Bahria University Islamabad Campus, 2019)
    There are a lot of mobility management schemes which are based on IP and developed to meet the requirement of mobility management in IoT such as HMIPv4, DHMIP, Proxy MIPv4 (PMIPv4) and so on. The Wireless Body Area Network ...
  • Muhammad Taseer ul Islam, 01-245171-012 (Bahria University Islamabad Campus, 2019)
    Wireless sensor network is a network system of sensor devices that are deployed randomly in a particular area. Usually hundreds or more nodes deployed in an area, these sensor devices are autonomous and small in size. A ...
  • Asfand Ganai, 01-245171-001 (Bahria University Islamabad Campus, 2019)
    Spectrum access strategy plays a critical role in multichannel cognitive radio networks (CRNs). The Cognitive radio is a key solution for radio spectrum under-utilization problem. It aims to increase the QoS of the system. ...
  • Raza Hussain, 01-245171-022 (Bahria University Islamabad Campus, 2019)
    Software Defined Networking (SDN) is platform that support network application more efficiently. SDN is successful because it decoupled the control plane from its data plane. Detachment of these two-planes improved dynamic ...
  • Muhammad Khan, 01-243162-008 (Bahria University Islamabad Campus, 2018)
    Brain tumor is a serious life threatening disease. Early diagnosis of disease is very important for treatment. There are more than 120 types of brain tumor. It is very difficult task to classify tumor manually because of ...
  • Zeeshan Haider, 01-242161-005 (Bahria University Islamabad Campus, 2018)
    Increased complexity of VLSI circuits has led to higher occurrences of faults in Integrated Circuit (IC). Moreover, testing of huge number of devices in loT technology is an important requirement from reliability point of ...
  • Muhammad Waqar, 01-243161-015 (Bahria University Islamabad Campus, 2018)
    Regression Testing is the type of software testing which ensures that the modified part of software or code change has not adversely affected existing features or code. Basically, whenever we want to add some new features ...
  • Maryam Aslam (Bahria University Islamabad Campus, 2018)
    Neural Networks is useful in many applications including supervised and unsupervised learning. For data mining tasks, neural models are not usually used because they mostly give incomprehensible model and requires longer ...
  • Muliammad Umar Farooq, 01-243161-005 (Bahria University Islamabad Campus, 2018)
    Writing skills are very important for succeeding as a writer. Every writer has specific style and way of communicating his thoughts. This specific way can be reusing specific set of vocabulary again and again, focusing on ...
  • Umar Hayat, 01-243162-017 (Bahria University Islamabad Campus, 2018)
    Textual content in videos contain rich information that can be exploited for semantic indexing and subsequent retrieval as well as development of video analytics solutions. The key modules in a textual content based video ...
  • Muhammad Sohail, 01-243161-012 (Bahria University Islamabad Campus, 2018)
    In encryption, the data is hide, by which the actual data is recovered through the decryption method. A lot of traditional cryptographic techniques to get the cipher-text in Symmetric cipher technique; such a technique is ...

Search DSpace


Advanced Search

Browse

My Account