Dissertations/Theses - Department of Computer Science and Engineering: Recent submissions

  • Rani, Priyanka (Department of computer Science and Engineering, 2021-03-31)
    A data breach happens when there is unapproved access to sensitive, protected, or confidential data. In today’s digital era, data has become one of the most significant components of an organization. Any loss or misuse of ...
  • Tripto, Nafis Irtiza (Department of computer Science and Engineering, 2021-03-18)
    Literature, as an imitation of human behavior, portrays the picture of society. Literary analysis offers a meaningful analysis of the literature by involving critical thinking from multiple perspectives. Analyzing the ...
  • Mahmood, Tropa (Department of computer Science and Engineering, 2021-12-22)
    Recommendation systems are vulnerable to injection attacks by malicious users due to their fundamental openness. One of the vulnerabilities is the fake co-visitation injection attack, which significantly impacts recommendation ...
  • Alam, Md. Nurul (Department of computer Science and Engineering, 2022-03-09)
    Loan default risk, also known as credit risk, is one of the significant financial challenges in banking and financial institutions since it involves the uncertainty of the borrowers' ability to perform their contractual ...
  • Biswas, Punam (Department of computer Science and Engineering, 2021-10-27)
    Traditional route planning and k nearest neighbors queries only consider distance or travel time and ignore road safety altogether. However, many travellers prefer to avoid risky or unpleasant road conditions such as roads ...
  • Akter, Mosammat Arifa (Department of Mathematics, 2021-09-29)
    The use of matrix in image processing is progressively increasing in many years. Singular Value Decomposition (SVD) is one such image compression technique that performs on matrices. In this thesis, we investigated an ...
  • Das, Sujoy (Department of computer Science and Engineering, 2022-03-01)
    The topological characteristics of the underlying network of a system are very important to study and analyze the system. The mode of interaction among the components of a system may introduce many kinds of systemic risks. ...
  • Mozumder, Md. Shamsul Arifin (Department of computer Science and Engineering, 2021-07-24)
    Internet of things (IoT) with a cloud server has become popular nowadays and it’s going to be used in almost every aspect of human life. All devices will be connected to the internet and can communicate with each other ...
  • Toha, Tarik Reza (Department of computer Science and Engineering, 2021-09-19)
    Inefficient traffic signal control system is one of the most important causes of traffic congestion in the cities of developing countries such as Bangladesh, India, Kenya, etc. This can be mitigated by adopting a decentralized ...
  • Rahman, Chowdhury Rafeed (Department of computer Science and Engineering, 2021-08-05)
    Though there has been a large body of recent works in language modeling for high resource languages such as English and Chinese, the area is still unexplored for low resource languages like Bangla and Hindi. We propose an ...
  • Papry, Khaleda Akther (Department of computer Science and Engineering, 2021-11-09)
    In wireless network, broadcasting is the most common communication method. To reduce re- dundancy, traffic and collision induced by broadcasting, different virtual backbones are used on top of the physical topology and ...
  • Aminur Rahman, Md. (Department of Computer Science and Engineering (CSE), BUET, 2019-09-28)
    Beggars are deprived of all the fundamental human rights, including healthcare support that often engenders consequences minor to severe, if not lethal, to this people. Bangladesh, having a significant number of beggars ...
  • Sanjida Nasreen Tumpa (Department of Computer Science and Engineering (CSE), BUET, 2019-06-09)
    Semantic Web, as an extension of the traditional web, is concerned about the vast amount of unstructured data, and with its motive to make the entire knowledge content machine-readable, as well as machine-interpretable, ...
  • Tariq Adnan, T. M. (Department of Computer Science and Engineering (CSE), BUET, 2021-02-23)
    Principal Component Analysis (PCA) is a widely popular technique for reducing the dimensionality of a dataset. Interestingly, when dimensions of the dataset grow too large, existing state-of-the-art methods for PCA face ...
  • Mehjabin Rahman (Department of Computer Science and Engineering (CSE), BUET, 2020-11-22)
    The concept of a peer-to-peer (P2P) energy trading system is becoming popular. Individuals will be capable of both consuming and producing energy without the need for centralized power plants. However, the integration of ...
  • Parvez, Md. Anwar (Department of computer Science and Engineering, 2019-10-02)
    Typosquatting is a form of internet cybersquatting generated from the mistakes (typos) made by internet users while typing a website address. It often leads the user to another unintended website. Sometimes it isexploited ...
  • Ibtehaz, Nabil (Department of computer Science and Engineering, 2020-02-08)
    The human body is the most complicated apparatus, comprising a plethora of mutually connected organs, performing diversely different sophisticated functions. These interconnected organs and processes communicate with each ...
  • Tumpa, Nadia Akbar (Department of Computer Science and Engineering(CSE), BUET, 2019-09-30)
    Named Data Networking is a new concept in modern internet technology instead of conventional TCP/IP architecture where nodes are addressed based on the interest of the the consumers. Internet security is a very challenging ...
  • Mina (Department of computer Science and Engineering, 2019-09-29)
    NamedDataNetworking(NDN)isthenamedbasednetworkingsystemfornext generation network architecture. In-network caching in NDN is a very challenging problemduetocomputationalcostforfindingthepropernodetostorethecontentin ...
  • Aflatul Sagir, Md. (Department of Computer Science and Engineering(CSE), BUET, 2019-09-28)
    Financial solvency analysis of a geographic area is a very challenging task because it costs lots of money and a big volume of data handling is involved. Every country in the world checks its ftnancial status, which is ...

Search BUET IR


Advanced Search

Browse

My Account