Department of Computer Science and Engineering (CSE): Recent submissions
Now showing items 221-240 of 249
-
A University website using Content Management System (CMS) and add-on plugins
(United International University, 2018-02-12)Thousands of students take the decision that will have the significant impact on the rest of their live. This decision will affect their career, earnings, and professional development. A university website is the first ... -
Online Movie Ticket booking System
(United International University, 2018-02-04)Online movie ticket booking system is a web based ticket booking system. Now a day’s people are very much dependent on internet. They like to do every day to day life chores or necessities in online because it is more ... -
DNA Binding Protein Identification Using HMM Profile
(2018-02-06)DNA-binding proteins play important role in various processes within the cell.Various machine learning classification algorithms and feature extraction techniques have been used to solve this computational problem of ... -
Designing Pedagogical Learning Environment in ICT
(2017-12-09)Pedagogy of ICT has great methodology in the interaction of the teachers teach, the students learn and the learning environment as well as the tasks. It helps expand the educational opportunities in different perspective, ... -
Restaurant Order Processing & Management on the Cloud
(United International University, 2018-01-28)We have all heard about cloud computing for once at least in our lifetime. Cloud Computing is really a fancy term which basically means your data is stored somewhere in a physical location but they are almost always ... -
WEB BASED QUIZ SYSTEM
(United International University, 2018-01-22)The RUBIX QUIZ is a web based quiz system where students from class VI to X can attend the examination of multiple choice questions. In this platform they can also justify themselves after giving the examination as result ... -
School Management System (SCMS)
(United International University, 2018-01-21)Education is the key to unlock the golden door of freedom. After parents this is teacher who guides children to the path of success. At this current age of education in most of the places Bangladesh is felled behind in ... -
Women’s Online Magazine System (E-Zine)
(United International University, 2018-01-15)E-ZINE is an innovative creation in women’s electronic magazine world. There are many electronic papers and magazine in Bangladesh but none of them are not being able to satisfy the user. E-Zine is published with desire ... -
A Study of Data Center Design and Implementation in Bangladesh
(2018-01-13)A data center is a facility used to houses various equipment such as computer systems, servers like web servers, application servers, database servers and associated components, such as and storage telecommunications ... -
E Commerce Web Platform Development
(United International University, 2017-12-30)E-Commerce also known as Electronic Commerce, selling of service or products via the internet or computer network. E-commerce has been a revolutionized medium for both buyers and sellers. When E-Commerce emerged people ... -
CARECANCER.NET
(United International University, 2017-12-29)The website CARECANCER.NET is to assist Cancer Patients/Caregivers of affected people to find it easy to know or view symptoms, care, treatment, medicine store, hospitals, and emergency contacts, as per their own requirements. ... -
Prominent-Tech: E-Commerce Site for Electronic Goods
(United International University, 2017-12-09) -
The Impact of Bangabandhu Satellite on Telecom Sector in Bangladesh
(United International University, 2017-09-15)Satellite communications is now the integral part of most major telecommunications systems. Satellite allows people with no access to physical connectivity to join roundtable discussion from thousands of miles away can ... -
Study on Single Source Shortest Path Algorithms
(United International University, 2017-12-13)Single Source Shortest Path Algorithm is one of the most used algorithm for routing and tracking path around the world for communication. Nowadays various famous apps are also using this algorithm to track the path and ... -
Attendance System for Multi-Shift Manufacturing Industries
(United International University, 2017-12-18)HR departments of many manufacturing industries in Bangladesh are reluctant to prepare a roaster for daily laborers. Usually a manufacturing industry runs multiple shifts for workers. Workers’ attendances are captured ... -
Enhanced Classification Accuracy on Naive Bayes Data Mining Models
(International Journal of Computer Applications, 2011-08-01)A classification paradigm is a data mining framework containing all the concepts extracted from the training dataset to differentiate one class from other classes existed in data. The primary goal of the classification ... -
On the Power of Feature Analyzer for Signature Verification
(IEEE, 2012-12-06)This paper is concerned with verification of signatures using feature analysis and non linear classifier. Signatures are collected and scanned to obtain input image. Preprocessing involves removal of noise and making the ... -
A New Approach for Compressing Color Images using Neural Network
(CIMCA, 2003-02-14)In this paper a neural network based image compression method is presented. Neural networks offer the potential for providing a novel solution to the problem of data compression by its ability to generate an internal data ... -
Adaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier
(International Journal of Computer Applications, 2011-06-01)In this paper, we introduce a new learning algorithm for adaptive intrusion detection using boosting and naïve Bayesian classifier, which considers a series of classifiers and combines the votes of each individual classifier ... -
Attacks classification in adaptive intrusion detection using decision tree
(World Academy of Science, Engineering and Technology, 2010-03-22)Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems ...