BS: Recent submissions

  • Muhammad Usman Farooq (SEECS, National University of Sciences and Technology, Islamabad, 2005)
    Today security of data is of prime importance. Many organizations implement solutions that provide security of their important data. The transmission of data on the network should also be fast and reliable. NUST and its ...
  • Muhammad Omair Shafiq (SEECS, National University of Sciences and Technology, Islamabad, 2005)
  • Junaid Ahmed (SEECS, National University of Sciences and Technology, Islamabad, 2005)
    Global acknowledgement of multi-databases has been made by the advancement in information and communication technologies. A multi-database system maintains a single global database schema which is the integration of all ...
  • Ali Adil, Abid Khan (SEECS, National University of Sciences and Technology, Islamabad, 2011)
  • Ahmed Yar Khan (SEECS, National University of Sciences and Technology, Islamabad, 2005)
    The Network Simulator 2 (NS-2) is a popular and powerful simulation environment, and the number of NS-2 users has increased greatly in recent years. Although it was originally designed for wired networks, NS-2 has been ...
  • Muhammad Usman Anwer (SEECS, National University of Sciences and Technology, Islamabad, 2005)
    Data mining has emerged to be the hottest technology of today’s world. It has been used in a number of fields like bio-informatics, customer prospecting, product matching etc. In each of these fields, purpose is the same ...
  • Salman Arshad Cheema (SEECS, National University of Sciences and Technology, Islamabad, 2004)
    Task Management System maintains the users’s tasks and appointments records which include new task assignments, task delegation, sub tasking, and task tracking and recurrence appointments. The system provides reminder and ...
  • Asma Arshad (SEECS, National University of Sciences and Technology, Islamabad, 2006)
    Accuracy, in the estimation of physical location or tracking of a moving target is of utmost importance. The overwhelming reason is that an accurate target’s location must be known for its data to be meaningful. If a system ...
  • Syed Kashif Jehan (SEECS, National University of Sciences and Technology, Islamabad, 2005)
    As businesses place more applications on the Web, they expose more of their sensitive customer data to hackers. Web server Fingerprinting is a relatively new topic of discussion in the context of application security. One ...
  • Yasir Zahoor (SEECS, National University of Sciences and Technology, Islamabad, 2007)
    To be in pace with the new world of technology all major processes at different levels are being automated. There is also a need of such kind of process automation in the Software Industry. Although this industry has taken ...
  • Ahmad Hassan (SEECS, National University of Sciences and Technology, Islamabad, 2006)
    VOIP is a revolutionary technology that has the potential to completely rework the world's phone systems. What we want to achieve is, to build an application that performs following tasks using VOIP (Voice over Internet ...
  • Muhammad Aqeel Haider (SEECS, National University of Sciences and Technology, Islamabad, 2008)
    This project intends to automate the Inventory System of NUST- SEECS. This project brings ease in managing the inventory of the university. Currently the inventory is managed manually which requires a lot of the paperwork ...
  • Nazneen Azher (SEECS, National University of Sciences and Technology, Islamabad, 2008)
    The internet communications are particularly vulnerable to security threats due to their open and distributed nature. With online businesses that have no boundaries, threats to authentication of users, data integrity and ...
  • Abdul Moeed Tariq (SEECS, National University of Sciences and Technology, Islamabad, 2004)
    Network security has always been a major concern for companies. Many a time’s poor network security has resulted into huge amount of losses for the companies. Companies need to be responsible for their own protection. For ...
  • M Ihtisham Ul Haq (SEECS, National University of Sciences and Technology, Islamabad, 2006)
    This report deals with the development and implementation of Secure Automation of Research Conferences (SARC) to aid the manual/traditional conference management activities through a single, database driven web application. ...
  • Faisal Khan (SEECS, National University of Sciences and Technology, Islamabad, 2005)
    Many business organizations are facing the dilemma of being data-rich and information-poor. Unprecedented decrease in cost of data storage has led to an exponential increase in amount of data at key public sector organizations. ...
  • Ammar Ahmad Awan (SEECS, National University of Sciences and Technology, Islamabad, 2008)
  • Rabia Tariq (SEECS, National University of Sciences and Technology, Islamabad, 2006)
    Online Workspace is a web-native, team collaboration tool to increase organizational efficiency, individual accountability and managerial effectiveness by allowing businesses to share important information in a secure and ...
  • Hareem Hameed (SEECS, National University of Sciences and Technology, Islamabad, 2007)
    Real Estate industry is a major source of wealth creation for investors, contributing significantly to the socio-economic well being of all the citizens, and is surely to increase in the coming years keeping in mind the ...
  • Umair Raza Abbasi (SEECS, National University of Sciences and Technology, Islamabad, 2006)
    A system strong enough and intelligent enough that it can actually help individuals not only to communicate with each other but also for individuals and companies alike, in finding jobs/employees for themselves. Online ...

Search DSpace


Advanced Search

Browse

My Account