Department of Computer Sciences (BUIC-E-8): Recent submissions

  • Afan Haidar, 01-249192-004 (Computer Sciences BUIC, 2021)
    Image search methods (for example, Search On Google), rely on text features. This results in uncertain and noisy outcomes. Robots are getting more intelligent, efficient, and capable of completing more challenging tasks, ...
  • Muhammad Rehman, 01-247192-016 (Computer Sciences BUIC, 2021)
    In the pharmaceutical industry, problems like counterfeit drugs including vaccines, and their supply chain management problems like transparency, immutability, and traceability exists. Around 30% of the total medicine sold ...
  • Muhammad Haroon Akram, 01-243171-034 (Computer Sciences BUIC, 2019)
    In this century, deep learning has been applied for many research areas after accomplishing considerable improvements of prediction in solving complex problems in computer vision and computational linguistics area. However, ...
  • Muhammad Nouman Noor, 01-243172-020 (Computer Sciences BUIC, 2019)
    Software testing is an activity conducted to test the software. It has two approaches; manual testing and automation testing. Automation testing is an approach of software testing in which programming scripts are written ...
  • Syed Abdul Basit, 01-243172-032 (Computer Sciences BUIC, 2019)
    Identification and classification of nuclei from microscopy is vital to new pharmaceutical developments. Biologist lacks a robust and efficient way to detect nuclei to natural variation in their appearances as well as ...
  • Aizaz Raziq, 01-247192-002 (Computer Sciences BUIC, 2021)
    Wireless Sensor Networks (WSN) are dedicated sensor nodes based connected network for data sensing and further transmit to the end devices for decision making. The sensor nodes are using advance communication technologies ...
  • Aaqib Mehran, 01-243172-045 (Computer Sciences BUIC, 2019)
    Detecting ships from satellite images is a challenging task in the remote sensing. It is very important for security, traffic management and to avoid smuggling etc. SAR (Synthetic Aperture Radar) is mostly used technology ...
  • Aamir Fayyaz, 01-243172-001 (Computer Sciences BUIC, 2019)
    Generating and understanding the 3D shape of objects in the world is a crucial step for many areas of robotics. Across object categories, shapes are used for classification. Within each category, fine shape details and ...
  • Hafiza Ghazal Shahid, 01-243172-048 (Computer Sciences BUIC, 2019)
    Negative Emotions can cause serious health issues and detection of them through daily activities is good for wellbeing .Handwriting and drawings are the activities which requires no specific devices only pen and paper is ...
  • Shahbas Hassan, 01-243172-029 (Computer Sciences BUIC, 2019)
    Recognition of cursive handwritten text is a complex problem due challenges like context-sensitive character shapes, non-uniform inter and intra word spacings, complex positioning of dots and diacritics and very low ...
  • Sikandar Hayat, 01-243172-049 (Computer Sciences BUIC, 2019)
    Identification of plant disease is beneficial not to protect plants from diseases but also to increase the budgetary advancement of a country. The study of plant disease identification means the study of visually pattern ...
  • Anjum Abbas, 01-245191-002 (Computer Sciences BUIC, 2021)
    The Internet of Things (IoT) is an ideal area and concept where objects are connected for data communication to share information by using different communication standards. The IoT comprises smart objects which have partial ...
  • Aneeqa Ahmed, 01-247192-003 (Computer Sciences BUIC, 2021)
    Many interconnected smart devices or objects interacting with the physical environment known as the Internet of Things (IoT) are available for communication these days. IoT devices perform complex tasks with a high level ...
  • Bushra Khalid, 01-247192-014 (Computer Sciences BUIC, 2021)
    Over the recent decade, Wireless Sensor Network (WSN) has gained attention because of its vast variety of applications. The WSNs applications have play a major role in our daily life activities start from healthcare, ...
  • Zeeshan Masood, 01-247182-017 (Computer Sciences BUIC, 2021)
    Since the number of mobile phone users are also expected to increase in the coming years, this development shows a limitation in the implementation of centralized mobility management. In this paper, Therefore a distributed ...
  • Muhammad Umar Farooq, 01-247182-023 (Computer Sciences BUIC, 2021)
    The art of securing and averting the network from unauthorized access is commonly known as network security. With the growth of internet technologies, network traffic needs to be made more protected. Modern technologies ...
  • Syed Wasim Haidar, 01-247191-011 (Computer Sciences BUIC, 2021)
    Internet of Vehicle (IoV) is one of the demanding and new area of research based on Internet, cloud, edge and 5G services. However, these networks are suffered with some congestion, routing and security issues especially ...
  • Hassan Qadeer, 01-247182-002 (Computer Sciences BUIC, 2021)
    Malware is becoming the greatest threat to computers and information systems around the globe. Threat actors carry out business frauds or steal personal information from genuine users. More than 1100 million global malware ...
  • Shahid Mahmud, 01-247182-015 (Computer Sciences BUIC, 2021)
    People use a variety of internet applications, and often people prefer to reuse the same identity and password with different applications or services to make remembering them easier. While this type of handover activity ...
  • Saman Khawar, 01-249192-014 (Computer Sciences BUIC, 2021)
    Parkinson’s disease is a severe neurodegenerative disorder that impairs the motor system over time, causing the slowness of speech and movements, as well as abnormal writing abilities due to tremors. Parkinson’s patients ...

Search DSpace


Advanced Search

Browse

My Account