Welcome to DSpace BU Repository
Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
Browsing MS (TN) (BUIC-E-8) by Title
-
Hafiz Daniyal Aslam, 01-245161-005
(Bahria University Islamabad Campus, 2019)
Centralized methodology is used in locator identifier separation protocol for mapping control, in this scenario for the purpose of portability stay of many hosts a Map server is utilized. In any case, this type of centralized ...
-
Farooq Ul Islam, 01-245171-002
(Bahria University Islamabad Campus, 2019)
Vehicular Ad hoc Networks (VANETs) have adopted the smart abilities of wireless networks and make the data communication possible through vehicle nodes. These networks support various types of applications related to safety ...
-
Muhammad Qasim Tayyab, 01-244152-087
(Bahria University Islamabad Campus, 2018)
Wireless Body Area Networks (WBANs) are increasingly popular in recent years due to their impending use in emergency environments such as in battle fields, disasters, monitoring of human health applications. To achieve the ...
-
Kashif Shabir, 01-244111-007
(Computer Science BU E8-IC, 2012)
Multi Input Multi Output (MIMO) is a promising technique to achieve higher data rates. In MIMO multiple data streams can be transmitted simultaneously using same frequency. Spectral efficiency can be increased by using ...
-
Muhammad Zeshan Qurashi, 01 -245171-014
(Bahria University Islamabad Campus, 2019)
In WBAN, large numbers of sensors are deployed inside and outside of human body. People with the chronic disease require long-term hospitalization. To avoid from longerm hospitalization. WBAN is the ideal way. Main objective ...
-
Asfand Ganai, 01-245171-001
(Bahria University Islamabad Campus, 2019)
Spectrum access strategy plays a critical role in multichannel cognitive radio networks (CRNs). The Cognitive radio is a key solution for radio spectrum under-utilization problem. It aims to increase the QoS of the system. ...
-
Numan Mushtaq, 01-244122-015
(Bahria University Islamabad Campus, 2014)
Energy conversation is one of the primary objective of duty cycle MAC protocols. A
number of synchronous and asynchronous duty cycle MAC protocols are proposed in the
recent years. Especially recently proposed Asynchronous ...
-
Sundass Khaliq, 01-244141-021
(Bahria University Islamabad Campus, 2016)
Recent advances in sensors, as well as wireless communication technologies have made it possible to build powerful wireless sensor networks. A Wireless Sensor Network (WSN) is composed of many low-cost and small wireless ...
-
Azmat Ullah Khan, 01-244151-049
(Bahria University Islamabad Campus, 2017)
Traffic accidents on the road cause losses of thousands of lives, injuries and huge material damages every year due to violations. Having an efficient way to detect violations could be helpful to reduce such incidents. ...
-
Azmat Khan
(Bahria University Islamabad Campus, 2013)
Introduction
Literature review
Methodology
result and Discussion
Conclusion
-
Muhammad Ali Lodhi, 01-244131-002
(Bahria University Islamabad Campus, 2015)
IPv6 routing protocol for low-power and lossy networks (RPL) is one of the most interesting
research areas in the domain of wireless personal area networks (WPANs). RPL is the standard
IPv6 based protocol for routing ...
-
Meer Muhammad Khan;01-244131-042
(Bahria University Islamabad Campus, 2015)
-
Amin Ullah, 01-245161-002
(Bahria University Islamabad Campus, 2018)
Wireless body area network (WBANs) is one of the significant area of research where low power sensor nodes have used to monitor the patient conditions. These sensor nodes are implanted on and around the patient body. The ...
-
Murtaza Naveed, 01-244072-029
(Computer Science, 2009)
Authentication process of user in mobile networks is an important issue. Previous standard of telecommunication Global System for Mobile Communication (GSM) has many security weaknesses.
Under Third Generation Partnership ...
-
Naima Rehmani, 01-244062-031
(Computer Science, 2010)
For the end user mobility is one of the distinctive values that wireless technology offers. One of the main mobility challenge$ is to maintain an ongoing session without interruption while on the move, even at vehicular ...
-
Talha Naqash
(Computer Science BU E8-IC, 2013)
In wireless communication, Femtocells are used to enhance the service coverage inside the office or home, particularly where access is narrow or engaged. Femtocells enhance the service quality that is attractive for the ...
-
Muhammad Zubair Aziz, 01-244072-027
(Computer Science, 2009)
Wireless Sensor Networks (WSN) is composed of sensor nodes deployed to achieve some specific task. Localization of individual mobile node is a challenging task in wireless
sensor networks. Localization system is not only ...
-
Gulnaz Ahmed
(Bahria University Islamabad Campus, 2013)
Introduction
Related Work
Cluster Chain based relay node Assignment
Simulation
Results
Conclusion
-
Muhammad Umair Bashir, 01-245171-013
(Bahria University Islamabad Campus, 2019)
Wireless Sensor Networks (WSNs) are becoming one of the demanding platform for sensing the physical world. Various applications have been designed for monitoring purposes, in which sensor nodes can sense the physical or ...
-
Momina Khan, 01-244102-066
(Computer Science BU E8-IC, 2012)
To achieve performance optimization in opportunistic Delay Tolerant Networks (DTNs), most flooding based routing algorithms like Epidemic and Probabilistic Routing Protocol using History of Encounters and Transitivity ...