Now showing items 32-51 of 82

    • Ghorer Bazar 

      Hossain, Tabassum; Tonmoy, Jabid; Yesmin, Farzana; Amin, Muhammad; Oyshi, Taskia; Shaeif, Numair (2022-02-27)
      Listing for groceries is a very difficult and time-consuming work of our life. It is related to the daily life of every person. So, the main goal of our project is to make an application for our users, for their daily ...
    • Home Security Automation Using Internet of Things 

      Sharma, Sudipta; Uddin, Borhan; Islam, Md. Azizul (2018-05-23)
    • Home Tele-Health System 

      Alam, Khurshed; Mim, Emdadul Haque; Sikder, Shaek Mahmud (United International University, 2018-03-09)
      Information And Communication Technology (ICT) is grown up rapidly in many sectors in Bangladesh. But healthcare system is not so developed in our country using ICT. In this thesis, we have designed a model named Home ...
    • A Hybrid Approach for Feature Subset Selection to Classify High-Dimensional Data 

      Akter, Sanzida; Pritom, Hasib Rashid; Reza, Antara Anika; Suvo, Rakib Hasan (2019-03-27)
      In this modern era, we need to deal with large dimension of data set every day. Be it on social media, business, medicine or gene expression there are thousands of millions data to be processed everyday. So dealing with ...
    • Image Capturing and Automatic Face Recognition 

      Momtahina; Hossain, Rakibul; Rahman, Md. Mushfiqur; Tania, Onul Ashrafi (United International University, 2019-02-20)
      As we know, the face is the easiest way to distinguish someone’s individual identity of each other. Face recognition is someone’s personal identification system where it uses personal characteristics to identify his/her ...
    • An in depth exploration on Blockchain Technology using Cryptocurrency 

      Ahmed, Jahir; Bhuia, Akib; Ahmed, Rifat Ara; Hossain, Ambia Md. (2019-02-18)
      Blockchain is a suite of distributed ledger that can be programmed to record and track any significant data. The most important use of blockchain technology is the Bitcoin Cryptocurrency. Blockchain records every Bitcoin ...
    • Integration of IoT and Cloud Computing: Development of an Intelligent Face-recognition System 

      Ahmed, Asif; Bipul, Md. Younus; Imran, Syad Md.; Tahniat, Niger Sultana (2018-11-22)
      IoT has seen steady growth over recent years with smart home appliances, smart personal gear, personal assistants, industrial assistance and many more. Devices used in the Internet of Things (IoT) are often low-powered ...
    • Internal Security Monitoring of an Organization by Scapy & Kali Linux 

      Zaman, Most. Mithyla; Bristy, Badrun Nahar; Mukur, Tasnim Morium (2018-12-18)
    • IoT Based Smart Healthcare 

      Hasnat, Md. Sharif; Mamun, Shamim Al; Hossain, Fariha; Hossain, Sumaiya (2019-02-05)
      In regular medical system in hospitals patients’ medical records are written in papers and sometimes they forget to bring it next time or lose it between appointments. For this reason, doctors are mostly unaware about ...
    • Machine Learning for Mining Big Data: A Review 

      Hossain, Masroor Fattah Bin; Mamun, Abdur Rahman; Mishu, Monika Akter (2018-11-24)
      Development of Big Data is virtually transforming our lifestyle. It is also accelerating industrial growth through process optimization, insight discovery and improved decision making. The massive scale of big data exceeds ...
    • Machine Learning for Mining Big Data: A Review 

      Masroor Fattah Bin, Hossain; Abdur Rahman, Mamun; Monika Akter, Mishu (2018-11-20)
      Development of Big Data is virtually transforming our lifestyle. It is also ac- celerating industrial growth through process optimization, insight discovery and improved decision making. The massive scale of big data exceeds ...
    • Monitoring System for ICU Patient with Heart Disease 

      Amin, Nasirul; rahman, abdur; afrin, sadia; kamal, nushrat (2019-05)
    • Network Intrusion Classification Employing Machine Learning: A Survey 

      Akhi, Afroja Bhuiyan; Kanon, Esrat Jahan; Kabir, Arpita; Banu, Atika (2019-01-18)
      In this modern era computer network security is a vital issue. Network security is developed by an efficient Intrusion Detection System (IDS). It is used to identify unauthorized access, malicious attacks and give an alert ...
    • Network Intrusion Classification with Feature Reduction 

      Munir, Md. Sirazul; Alam, Md. Shamsul; Jahan, Irin; Ferdaous, Jannatul (2019-05-29)
      Nowadays, in data technology, data preservation has become a good issue. Computers and completely different security breaches are incessantly attacked by security threats. There are completely different malicious network ...
    • Network Monitoring, Detection & Analysis 

      Tushar, Ahadul Islam; Choudhury, Urbi Roy; Boby, Sadeka Afrin; Rajon, Md. Rasheduzzaman (2019-02-05)
      As we know, the amount of connecting devices is increasing very fast. The rapid growth of computer network system brings many benefits of an organization. As well as there are many networking security issues also. We need ...
    • Novel Class Detection in Concept Drifting Data Streams Using Decision Tree Leaves 

      Saha, Deepita; Haque, Md Mozzammel; Sarkar, Akash; Alam, Famina (2018-10-24)
      Concept drifting data streams often occurs in weather forecasting, intrusion detection and other applications. One of the difficulties with handling concept drifting data streams is the existence of novel classes in the ...
    • Online Daycare & Care Giver Management System 

      Debnath, Pabitra; Nabil, Md. Nur A Hasnat; Rony, Rehasun Tanjin; Sufian, Md. Abu (2018-10-02)
      Online daycare & caregiver service is becoming a promising business worldwide. Though it’s a new idea in Bangladesh. We can reasonably say that the process of searching & acquiring service on the web is becoming common ...
    • Online Daycare & Care Giver Management System 

      Debnath, Pabitra; Nabil, Md. Nur A Hasnat; Rony, Rehasun Tanjin; Sufian, Md. Abu (2018-10-02)
      Online daycare & caregiver service is becoming a promising business worldwide. Though it’s a new idea in Bangladesh. We can reasonably say that the process of searching & acquiring service on the web is becoming common ...
    • Optimal Route and Transport Finder for Dhaka City 

      Islam, Tawfiqul; Hossain, Md. Naym; Hossain, Md. Arman (2019-03-15)
      In this thesis, we are going to present an application regarding public transport information and optimal route planning for Dhaka city public transport in this thesis paper. We have developed this application on Web Based ...
    • Prediction of Lysine-Malonylation Sites via Sequential and Physicochemical Features 

      Ahmed, Asif; Sarkar, Kenedy; Aziz, Yeazullah; Khan, Toha (2018-10)
      Lysine Malonylation is Post Translational Modification responsible for Type2 diabetes, Cancer etc. It is a challenging problem as the data from kmal studies are highly imbalanced. In this work we propose Hybrid sampling a ...