Browsing Bachelor's Thesis by Title

MIST Central Library Repository

Browsing Bachelor's Thesis by Title

Sort by: Order: Results:

  • Noor, Rafi Imran; Alam, Nabila Binte; Ahmed, Saroar (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    InComputationalbiology,genomerearrangementbytranspositionisanimportantproblem. Genome evolution analysis by transpositions leads to a combinatorial optimization problem of sorting by transpositions. Though the status of ...
  • Anisuzzaman, Md.; Nazmul Huda Mithu, M. Niaz Mohammad; Shahriar, Md. Farhan (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2014-12)
    Now a day in our world, heart diseases are the number one major cause of death. Statistics says that about 80% of deaths occurred in low- and middle income countries. Ifcurrenttrendsareallowedtocontinue,by2030anestimated ...
  • Sultan, Sanjid Habib; Noumen, Afrin Jahan; Alam, Lamia (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2014-12)
    Ontologies are today a key part of every knowledge based system. They provide a source of shared and precisely defined terms, resulting in system interoperability by knowledge sharing and reuse. Unfortunately, the variety ...
  • Alam Khan, Samirul; Islam Chowdhury, Hanifa; Mansoor, Tasnima (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    The main objective of this thesis is to provide a solution for linking people around a community with the help of Semantic Web and FOAF. The Friend of a Friend (FOAF) project is creating a Web of machine-readable pages ...
  • Tasnia Islam, Samina; Ishaq, Sadaf; Shakir, Shamir (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    Formorethanadecadenowroboticsineducationhasgainedalotofattentionfromteachers, researchers,politicians,authoritiesandotherstakeholders. Duringtheyearsagreatnumber of methodologies, courses, projects, initiatives and ...
  • Istiak Ahmed, Md; Ridwan, Iffatur; Ahmed Fuad, Tanvir (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2014-12)
    Automatic speech recognition (ASR) known as speech recognition is a computer technology that enables a device to recognize and understand spoken words and sentences, by digitizing the sound and matching its pattern against ...
  • Maowa, Jannatul; Kabir, Sraboni; Khosru, Ibn Md. Abu Saleh (Military Institute of Science and Technology, 2012-12)
    Systems of linear equations are used in a variety of fields. The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. This ...
  • Iftekharul Hoque, Md.; Nur-E-Arefin, Md.; Saiful Ahmad, Md (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2012-12)
    Systemsoflinearequationsareusedinavarietyoffields. Thecanonicalproblemofsolving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. This thesis is aimed ...
  • MTC De Silva psc, Major SLSC Sri Lanka Army; Abdullah AlMamun, Lt Cdr (X), BN; M Noor Hossain, Instr Lt BN (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2012-12)
    Current era is a world of technology; every organization in the world is going to turn in to automationsystemfromthemanualsystembecausepeoplemaylovetoworkfromdifferent location, fast access, keeping digital records and ...
  • Lutfor, Abu Sa-Adat Mohammed Moinul Hasan; Islam, Md. Shahidul; Dey, Arup Kanti (Military Institute of Science and Technology, 2013-12)
    The divide and conquer approach is very useful in computer science applications. With this approach a large problem is broken down into small and manageable subproblems and each is solved separately. Then these solutions ...
  • Bari Khan, Imdadul; Nahar, Mst. Naznin; Islam, Farzina (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    The divide and conquer approach is very useful in computer science applications. With this approach a large problem is broken down into small and manageable subproblems and each is solved separately. Then these solutions ...
  • Faisol, Mohammod; Tamanna Rahman, Sofia Zerin; Mahbub-e-Zaman, Md. (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    Different modulation formats are being used to mitigate either the PMD or the nonlinear effects. CSRZ-DPSKandCSRZ-DQPSKsystemsshowhighsuitabilityforultra-highspectralefficientDWDMsystemsandhighresiliencetodispersioncompen ...
  • Islam, Raisul; Hasan, Nazmul; Riasat Ahmed, Mohammad (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    InthefieldofIT,cloudcomputingintroducesanewera. AlmosteverypartoftheITdepends on this cloud computing. It is the latest technique of providing computational resources as a service. It reduces many hurdles in the field of IT. ...
  • Roy, Soumen; Sohaib, Md Abu; Kamal, Md Khaled (Department of Computer Science and Engineering(CSE), Military Institute of Science and Technology (MIST), 2014-12)
    In the digital world, which is currently evolving and changing at such a rapid pace, the security of digital information has become increasingly more important. Due to great development of secret contact and communication ...
  • Mithila, Nasrin Hakim; Rahman, Bushra; Taher, Alif Bin (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2012-12)
    Wireless sensor networks (WSNs) consist of a large number of sensor nodes that are densely deployed in a region of interest to collect data about a target or event, and to provide a variety of sensing and monitoring ...
  • Israt Zahan, Major Kazi; Md. Asheque Alahi, Major; Rani, Priyanka (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    Oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance are the applications of Underwater sensor nodes. Moreover, unmanned or autonomous ...
  • Sharmin Afroze, Lt; Sharmin, Nusrat; Rahman, Sazzadur (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    A network-based mobility management protocol called Proxy Mobile IPv6 (PMIPv6) is being actively standardized by the IETF NETLMM working group, and is starting to attract considerable attention among the telecommunication ...
  • Nawshin, Ishrat Jahan; Jyoti, Sharmin Jahan; Zeba, Shamme Akter (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2014-12)
    Wireless Local Area Networks (WLANs) have become more prevalent and are widely deployed and used in many popular places like university campuses, airports, residences, cafes etc. With this growing popularity, the security ...
  • Hossain, Md. Azad; Abdullah, Yunus Ibne (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2013-12)
    The rapid worldwide growth of data and internet traffic in telecommunication networks has resulted in a sharp increase in the demand for transmission capacity. Efficient utilization of the existing optical fiber network is ...
  • Wasim Azad, Md.; Prosad Roy, Bipul; Rahman, Sazzadur (Department of Computer Science and Engineering, Military Institute of Science and Technology, 2012-12)
    Thousand of persons are being killed as a cause of earthquake. The disaster in the Dhaka City may claim thousands of lives due to Earthquake. It is said if survivors are found and rescued earlier the numbers of victims ...

Search DSpace


Advanced Search

Browse

My Account