Browsing Department of Computer Sciences (BUIC-E-8) by Title

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Browsing Department of Computer Sciences (BUIC-E-8) by Title

Sort by: Order: Results:

  • Zohaib Ali, 01-247212-018 (Computer Sciences, 2023)
    The emergence of smart health technologies has brought numerous benefits in healthcare services such as remote patient monitoring, personalized treatment, and early disease detection. However, these technologies also pose ...
  • Aizaz Raziq, 01-247192-002 (Computer Sciences BUIC, 2021)
    Wireless Sensor Networks (WSN) are dedicated sensor nodes based connected network for data sensing and further transmit to the end devices for decision making. The sensor nodes are using advance communication technologies ...
  • Naveed Khan (Computer Sciences, 2003)
    As we know that the Internet is the information highway and one is alvars curious about the working of this perfect network. With this project we took the opportunity to dive in to complex yet technical ocean of Internet ...
  • Jahanzaib Chughtai (Computer Sciences, 2002)
    These days the needs of the Network are growing rapidly. Almost all the companies and Enterprises are converting their Local area Networks into Wide are networks but the problem they face is the cost of the router because ...
  • Rehman Mumtaz (Computer Sciences, 2004)
    These days the needs of the Network are growing rapidly. Almost all the companies and Enterprises are converting their Local area Networks into Wide are networks but the problem they face is the cost of the router because ...
  • Rebman Mumtaz (Computer Sciences, 2002)
    These days the needs of the Network are growing rapidly. Almost all the companies and Enterprises are converting their Local area Networks into Wide are networks but the problem they face is the cost of the router because ...
  • Fawad Ahmad Shahzad, 01-247182-025 (Bahria University Islamabad Campus, 2021)
    Living in the era of the computerized world and internet network security has become the main concern of users. One of the main threats to network security is DDoS attack. The DDoS attack is the type of attack in which the ...
  • Muhammad Riaz, 01-241042-002 (Bahria University Islamabad Campus, 2013)
    This project is an extreme Networking result for fetching, store the resource informative data of client computers. It furnishes the instrumented administration flexibility to the server to overcome the manual checking of ...
  • Joddat Fatima, 01-284152-001 (Computer Sciences, 2023)
    The spinal cord is an fundamental structure that creates a connection between the brain and the rest of the body. The long thin cord is made up of twisted nerves and tissues in combination with the 33 separate bones stacked ...
  • Hamniece Hafeez Siddiqui, 01-243191-007 (Computer Sciences BUIC, 2021)
    Wireless sensor networks are used in the field of civilian as well non-civilian purpose. Civilians use it for the seismic monitoring, environmental condition monitoring and condition monitoring. The coverage area of the ...
  • Ehzaz Arshid, 01-247192-005 (Computer Sciences BUIC, 2021)
    The most widely used protocols for internet communication are Internet Protocol (IP) and Transport Control Protocol (TCP). IP served an important role in internet communication but as the number of internet connecting ...
  • Ashfaq Ahmed Afridi (Computer Sciences, 2002)
    This Project , Location and Navigation based System (LNbS) relates to the field of Wireless Application Protocol (WAP). This project is specially designed with providing location-based services to a mobile user in mind. ...
  • Waheed Khan (Computer Sciences, 2002)
    This Project , Location and Navigation based System (LNbS) relates to the field of Wireless Application Protocol (WAP). This project is specially designed with providing location-based services to a mobile user in mind. ...
  • Saadia Aziz (Computer Sciences, 2003)
    This report was prepared as a part of final year project of MCS program and explains the need, analysis & working of database system developed for Electronic Technology Division (ETD) of Askari Commercial Bank Limited, ...
  • M. Abu Bakar Khan, 01-249212-007 (Computer Sciences, 2023)
    Route optimizationisakeyissueinseveralfields,includingtransportation,lo- gistics, andsupplychainmanagement.Routeoptimizationisdeterminingthemost effectivesetofroutestomeetcertaincriteriasuchasdistance,time,andcost.The ...
  • Muhammad Khurram Hameed, 01-247182-022 (Bahria University Islamabad Campus, 2020)
    Hardware-based implementations of stream ciphers and ring-learning with error lattice-based post-quantum cryptography (RLWE-LB-PQC) ciphers are requirements of resource constraint and modern computing environments with ...
  • Anza Tahrim Abbasi, 01-249201-002 (Computer Sciences BUIC, 2022)
    Since object detection in the actual world is affected by illumination, object detection has been a challenging task for quite a long time. Under normal lighting conditions, image processing achieves significant efficiency ...
  • Numan Mushtaq, 01-244122-015 (Bahria University Islamabad Campus, 2014)
    Energy conversation is one of the primary objective of duty cycle MAC protocols. A number of synchronous and asynchronous duty cycle MAC protocols are proposed in the recent years. Especially recently proposed Asynchronous ...
  • Sundass Khaliq, 01-244141-021 (Bahria University Islamabad Campus, 2016)
    Recent advances in sensors, as well as wireless communication technologies have made it possible to build powerful wireless sensor networks. A Wireless Sensor Network (WSN) is composed of many low-cost and small wireless ...
  • Ahsan Iqbal, 01-243172-038 (Computer Sciences BUIC, 2019)
    In previous era, malware attacks have achieved serious heights. As information technology field strengthens, the activities of cyber-criminals are also updated. Cybercriminals always look for those methods to attack which ...

Search DSpace


Advanced Search

Browse

My Account