Thesis/Dissertation Repository Islamabad Campus: Recent submissions

  • Muhammad Tehseen Tahir, 01-243171-029 (Computer Sciences BUIC, 2019)
    User identification using the spatio-temporal geometries or trajectories has always been the interest of many researchers and is a very specific topic in fields related to data. Nowadays large spatio-temporal data are ...
  • Nauman Aslam, 01-243172-024 (Computer Sciences BUIC, 2019)
    With the continuous increase in population and drastic urbanization trends, roads have become a key perfonnance indicator of a city's smooth running. Road safety is an important concern for every city; surface conditions ...
  • Muhammad Kashif Iqbal, 01-243181-012 (Computer Sciences BUIC, 2021)
    Forecasting political events using a variety of information sources has become a practice in the era of Big Data. Analyzing data collected from multiple sources to predict the outcome of elections has been found effective ...
  • Ahsan Iqbal, 01-243172-038 (Computer Sciences BUIC, 2019)
    In previous era, malware attacks have achieved serious heights. As information technology field strengthens, the activities of cyber-criminals are also updated. Cybercriminals always look for those methods to attack which ...
  • Sara Abbas, 01-243162-014 (Computer Sciences BUIC, 2019)
    Regressing testing is way testing of software which are been updated to make sure the changes which occurred during updation or modification of software. Also ensure the modifications in code are not adversely affecting ...
  • Sikandar, 01-243171-014 (Computer Sciences BUIC, 2019)
    Information retrieval (IR) means automatic retrieval of required information into a wellorganized form from different sources. Early retrieval methods were ineffectual to beat the scalability and adaptability of natural ...
  • Moaz Ahmed, 01-243172-044 (Computer Sciences BUIC, 2019)
    Software Defined Network has brought the encouraging methods of dealing with the complex network. Managing the network was not easy with traditional rules. The softwaredefined feature allows taking advantage of programmability ...
  • Summia Taj, 01-243172-031 (Computer Sciences BUIC, 2019)
    Vehicular Ad hoc Networks (VANETs) have fascinated remarkable interests due to their great applicability and viable significance. Path planning in VANETs based on efficient collection of real time data, which effectively ...
  • Haider Ali Khan, 01-243172-043 (Computer Sciences BUIC, 2019)
    In the recent past, fields of computer vision and graphics have become more advanced and it is now easy to generate realistic fake videos and images. At present facial forgery techniques, such as Deepfake and Face2Face are ...
  • Asad Saleem, 01-243171-002 (Computer Sciences BUIC, 2019)
    Demosaicking is the task of recreating full-color image from deficient images framed from overlaid color channel exhibits on image sensors present in digital cameras. And denoising is the process to remove the unwanted ...
  • Sidra Nasir, 01-243191-012 (Computer Sciences BUIC, 2020)
    Computerized analysis of historical documents has remained an interesting research area for the pattern classification community for many decades. From the perspective of computerized analysis, key challenges in the ...
  • Muhammad Arsalan, 01-243172-015 (Computer Sciences BUIC, 2019)
    A variety of Machine Learning (ML) frameworks are being instigated to let developers build ML algorithms easily. The study include an evaluation of various Al toolkits that includes Tensor Flow, Scikit-Learn and Keras. We ...
  • Atiya, 01-243172-004 (Computer Sciences BUIC, 2019)
    Shoe prints are most commonly found evidence at crime scenes and can be used in identifying the suspects and in further investigation. A shoe print can provide different types of information which can be used for identification ...
  • M.Hassan Zaib, 01-243171-007 (Computer Sciences BUIC, 2019)
    Cyber-attacks have been on the rise especially after the explosive widespread of social networking as it gives cyber criminals a way to break into other's computers and manipulate personal and sensitive data. Many different ...
  • Mehwish Kiran, 01-243172-011 (Computer Sciences BUIC, 2019)
    An Electrocardiogram (ECG) plays an important role in medical field for detection of cardiac arrhythmia. Moreover, ECG signal contains different types of artefacts, Power line interface, Electromyogram (EMG) Noise, Baseline ...
  • Shahbaz Ali, 01-243162-022 (Computer Sciences BUIC, 2019)
    The Internet of Things (IoT) has been widely used in big data applications, remote sensing application, intelligent transportation system (ITS), smart homes/cities and urban planning, and so on. Apparently, to provide ...
  • Sh. M. Moghees Idrees, 01-243172-028 (Computer Sciences BUIC, 2019)
    Internet of Vehicle (IoV) is the parent class of vehicular ad hoc networks and has gained popularity in this decade due to various types of safety and infotainment applications. It provides comfortability and safety to ...
  • Maha Butt, 01-243172-010 (Computer Sciences BUIC, 2019)
    Trademarks are signs that are utilized in exchange to recognize items or administrations. They have turned out to be intangible intellectual property (IP) resources that enable merchandise or administrations to be effectively ...
  • Muhammad Ansar Bukhari, 01-243171-038 (Computer Sciences BUIC, 2019)
    Internet of Things devices are for the most part Mobile Nodes that need M o b i l i t y Management Protocols (MMPs) to be set up, to give straightforward administrations some problems, difficulties affect, correspondence ...
  • Sadaf Shahid, 01-243172-026 (Computer Sciences BUIC, 2019)
    Text categorization has been done vastly in different domains such as sp011s, food, law, politics, fashion etc as they are enrich with a lot of useful information. Legal text categorization has been performed by many authors ...

Search DSpace


Advanced Search

Browse

My Account