Browsing Department of Computer Sciences (BUIC-E-8) by Title

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Browsing Department of Computer Sciences (BUIC-E-8) by Title

Sort by: Order: Results:

  • Syed Hassan Ali, 01-243181-021 (Computer Sciences, 2022)
    In the recent times satellite images have become one of the most efficient and effective tool to observe the earth’s geographies. These images can be used in many application like early warnings of natural disasters etc. ...
  • Romana Talat (Bahria University Islamabad Campus, 2016)
    Scene Completion is an interesting Image Processing problem that has recently been studied in the context of data, i.e. by using large repositories of data. The idea is to extract the most suitable image from a data ...
  • Tahira Yasmin (Computer Sciences, 2004)
    School Management System is a Management Information System. It is developed for Asas International School Islamabad. Through this system school Principal can monitor the fee and salary calculation, employees and students' ...
  • Irfan-ul-haq Malik (Computer Sciences, 2003)
    Screeni\.Ds and Flashvision is the eli en t server application the application has been written in 1:\vo main modules .The product idea is based on the Advertisemen t, which facilitate advertiser to post different ads of ...
  • Samiullah Asghar, 144002-030 (Computer Sciences, 2004)
    Scrccnsaver Builder is a cool Screensaver maker software to help you make Screensaver easily .The product idea is based on the electronic marketing and internal cotporate messaging, which provide immediate direct-response, ...
  • Rizwan Saeed, 01-247201-012 (Computer Sciences BUIC, 2022)
    As a vital and cost-effective form of intelligence obtained from publicly accessible sources, Open Source Intelligence (OSINT) has gained widespread recognition in recent years. With the emergence of popular social media ...
  • Tasneem Aslam, 01-243171-035 (Bahria University Islamabad Campus, 2019)
    Software define networking relies on decoupling of data plane and network plane. Software define Wireless Network defines how networking and computing system can be form using a combination of open software, home engineering ...
  • Tajamul Shahzad, 01-243192-012 (Computer Sciences BUIC, 2021)
    In the current age as many types of embedded devices or sensor have been introduced to Internet of Things (IoTs) so, the Protocol named CoAP has been widely used. The critical issue based on web in IoTs environment was ...
  • Syed Wasim Haidar, 01-247191-011 (Computer Sciences BUIC, 2021)
    Internet of Vehicle (IoV) is one of the demanding and new area of research based on Internet, cloud, edge and 5G services. However, these networks are suffered with some congestion, routing and security issues especially ...
  • Muhammad Rehman, 01-247192-016 (Computer Sciences BUIC, 2021)
    In the pharmaceutical industry, problems like counterfeit drugs including vaccines, and their supply chain management problems like transparency, immutability, and traceability exists. Around 30% of the total medicine sold ...
  • Zeeshan Masood, 01-247182-017 (Computer Sciences BUIC, 2021)
    Since the number of mobile phone users are also expected to increase in the coming years, this development shows a limitation in the implementation of centralized mobility management. In this paper, Therefore a distributed ...
  • Ahsan Naseer (Computer Sciences, 2004)
    Security of information is the outmost important thing in today's software industry, and hence in the progress, prosperity and civilization of Nations. lts importance in the field of e-Commerce is twice than other software ...
  • Jahangir Haider, 242022-003 (Computer Sciences, 2004)
    As the information technology is growing with unexpected speed and is having a great impact on our socio economic life, the margin of error has reduced to almost to zero. A minute vulnerable point could result in disastrous ...
  • Furqan Ali (Bahria University Islamabad Campus, 2007)
    As the information technology is growing with unexpected speed and is having a great impact on our socio economic life, Information Systems are now become need of the time. Whenever the information is required /traveled ...
  • Muhammad Kashif (Computer Sciences, 2003)
    Secure Mai! Matrix is an enterprise-class application that provides a secure anti-spam solution to beat the spam without compromising corporate network. SMM act as an email gateway sitting in front of a corporate network ...
  • Mushtaq Ahmad (Computer Science BU E8-IC, 2012)
    Multi‐hop wireless ad hoc networks have attracted much attention in the field of research in modern times. In mobile ad hoc networks, nodes can be connected dynamically in a random fashion. Infrastructure of the network ...
  • Cdr. Asim Mahmood; Ms. Asma Asim (Computer Sciences, 2003)
    The use of both public and private networks to create a network connection is called a virtual private network (VPN). In this scenario, Electronic, Inc., a fictional company, has deployed Windows 2000 Point-to-Point Tunneling ...
  • Azhar Mahmood (Computer Sciences, 2004)
    This project describes the practical implementation of Dial-on-Demand Routing using PTCL lines. In this project there are two different scenarios exist. In first scenario, local user is connecting to the Branch office using ...
  • Rosheen Qazi, 01-247172-018 (Bahria University Islamabad Campus, 2019)
    Information security broadly refers to the state of protection against unsanctioned access of information or data, principally electronic or digital data. In today’s world of modern technology, there is a need to design ...
  • Zubair Azam (Computer Sciences, 2003)
    All over the world, security 1s an impmiant feature. A sensible cost is spent for implementing security in different organizations. When an organization grows, it entails security with different points of view. Security ...

Search DSpace


Advanced Search

Browse

My Account