Department of Computer Sciences (BUIC-E-8): Recent submissions

  • Munazza Younus, 01-244072-034 (Computer Science, 2009)
    The energy efficiency in wireless sensor networks plays a very important role because of the limited power of the battery used within nodes. This thesis presents Efficient Energy Aware Routing (EEAR) algorithm for wireless ...
  • Maisam Ali, 01-245191-007 (Computer Sciences BUIC, 2022)
    New technologies and communication standards have changed the traditional networks processes. Internet of Things (IoT) is one of the emerging technology where the devices are connected with each to facilitates the users. ...
  • Zeeshan Zahoor, 01-248192-010 (Computer Sciences BUIC, 2021)
    The present thesis determines the concept of the exact solution of nanofluid flow over a stretching/shrinking sheet with dual availability in the following steps. The thesis framework has been developed in the following ...
  • Robash Qasim, 01-248192-006 (Computer Sciences BUIC, 2021)
    The main purpose of this thesis is construct the mathematical model of the fluid flow in a rotating system between two infinitely flat surfaces. In this model one plate is stretchable while other is penetrable. By using ...
  • Syed Muhsin Abbas Naqvi, 01-248192-009 (Computer Sciences BUIC, 2021)
    The purpose of the present study is investigating the heat transfer of non-Newtonian pseudo-plastic nanofluid flow on a moving permeable flat plate with viscous dissipation and heat absorption/generation. The flow is uniform ...
  • Asma Jabeen, 01-248182-001 (Computer Sciences BUIC, 2020)
    A mathematical model is investigated to scrutinize flow of Tangent hyperbolic Nanofluid in Darcy-Forchheimer porous medium over a stretching cylinder with convective heat and mass conditions. The heat and mass transfer ...
  • Azaz Tahir, 01-247201-003 (Computer Sciences BUIC, 2022)
    An increasing number of users of social networks has significantly contributed to a enor increase in the amount of information on the Internet. Often, the content these users post on social networks can provide valuable ...
  • Javaid Wahab, 01-247201-007 (Computer Sciences BUIC, 2022)
    The Domain names and URLs are the building block of the internet but are being misused by cybercriminals to spread malware and launch attacks. The malicious URLs and Domains can provide a macro image of malicious activities. ...
  • Rizwan Saeed, 01-247201-012 (Computer Sciences BUIC, 2022)
    As a vital and cost-effective form of intelligence obtained from publicly accessible sources, Open Source Intelligence (OSINT) has gained widespread recognition in recent years. With the emergence of popular social media ...
  • Sami Ullah, 01-247201-013 (Computer Sciences BUIC, 2022)
    Both the industrial and academic communities have emphasized sentiment analysis methodologies for detecting illegal and hateful content from social media sites such as Twitter, particularly when applied to tweets. Machine ...
  • Nasir Ali, 01-247201-010 (Computer Sciences BUIC, 2022)
    Geolocation information for an IP can be used for various applications over the internet, like content delivery, advertising, fraud detection, & prevention. It can also be helpful in cyber security on both the offensive ...
  • Yasir Qadeer, 01-247191-014 (Computer Sciences BUIC, 2021)
    Internet has resulted an enormous rise in number of online social network (OSNs) users and popularity of social media. Privacy and security of OSNs require evaluation from different angles. Online rating systems are broadly ...
  • Ehzaz Arshid, 01-247192-005 (Computer Sciences BUIC, 2021)
    The most widely used protocols for internet communication are Internet Protocol (IP) and Transport Control Protocol (TCP). IP served an important role in internet communication but as the number of internet connecting ...
  • Faheem Iqbal, 01-245201-002 (Computer Sciences BUIC, 2022)
    The use of IoT devices is expanding every day in today’s environment. An interoperable protocol like AMQP is essential for supporting multiple IoT use cases and interconnecting IoT devices from different providers. Many ...
  • Anza Tahrim Abbasi, 01-249201-002 (Computer Sciences BUIC, 2022)
    Since object detection in the actual world is affected by illumination, object detection has been a challenging task for quite a long time. Under normal lighting conditions, image processing achieves significant efficiency ...
  • Muhammad Imran, 01-249201-006 (Computer Sciences BUIC, 2022)
    Deep learning models perform well in open-air captured image classification problems but, in the case of underwater images, can’t find better accuracy due to low-level features. Under-water image classification is a difficult ...
  • Muhammad Hamza, 01-249201-005 (Computer Sciences BUIC, 2022)
    Failure of facial recognition and authentication system may lead to several unlawful activities. The current facial recognition systems are vulnerable to different biometric attacks. This research focuses on morphing attack ...
  • Abdul Basit Mughal, 01-249201-018 (Computer Sciences BUIC, 2022)
    In the field of computer vision, person identification across several cameras is a very important task especially the identification of the same person in different scenes. Human gait identification is a biometrics technique ...
  • Saima Safdar, 01-249201-011 (Computer Sciences BUIC, 2022)
    Specific Language Impairment is a language disorder which prevents children from achieving language skills. Children that are affected with SLI are frequently late to speak and may not generate any words until they are two ...
  • Hafiz M Ehtaisham Fared, 01-249201-003 (Computer Sciences BUIC, 2022)
    Now a days we are surrounded by fake news. Fake news or disinformative news spread out with a very high ratio among various communities over the globe due to the advancement in technology in term of involving social media ...

Search DSpace


Advanced Search

Browse

My Account