MS: Recent submissions

  • Shamim, Nauman (SEECS, National University of Science & Technology, 2015)
    Automated data extraction from resume has a variety of applications such as online recruiting, human resource management. An e cient technique for resume zone identi cation and classi cation can help data extraction ...
  • Mushtaq, Saqib (SEECS, National University of Science & Technology, 2015)
    Web-blogs or news articles provide a large data set that can be used to classify information such as author's point of view, a liation or biasedness. While user reads some article, they have to acquire about author's ...
  • Mansoor, Hasan (SEECS, National University of Science & Technology, 2015)
  • Ali, Waqas (SEECS, National University of Science & Technology, 2016)
    This thesis addresses the problem of saliency detection in crowded scenes. Crowded scenes are those which have irregular scene density. Crowded scenes are more frequent in real world with applications in public management, ...
  • Habiba, Umme (SEECS, National University of Science & Technology, 2014)
    Secure handling and sharing of Identity credentials across multiple domains is considered to be the gravest issue faced by Cloud service consumers and Cloud service providers. Identity credentials are generally considered ...
  • Riaz, Junaid (SEECS, National University of Science & Technology, 2015)
    In current educational system, traditional method of learning and Project Based Learning are two popular techniques which are widely used by technology focused institutes. Each technique has its own pros and cons. ...
  • Usman, Khalid (SEECS, National University of Science & Technology, 2014)
    Brain tumor can grow anywhere in the brain, but it is commonly grown in the cells that make the brain tissues and the nerves covering the brain’s outer boundary called meninges. There are two main types of brain tumor ...
  • Iar, Asfand (SEECS, National University of Science & Technology, 2016)
    This thesis proposes a solution of how eye movement data can be used for biometric identification. Eye movement data have behavioral characteristics that are useful for biometrics. Different statistical features are ...
  • Younas, Farzana (SEECS, National University of Science & Technology, 2015)
    Cloud computing has become a powerful computing platform for web applications because of the ability to auto-scale based on the demand from the users. Many cloud service providers including Amazon, Azure etc. and software ...
  • Butt, Umair Muneer (SEECS, National University of Science & Technology, 2016)
  • Butt, Maryam Qamar (SEECS, National University of Science & Technology, 2017)
    Substantial research is being conducted in spatial and spatiotemporal saliency modeling for images and videos respectively with the aim of eye xation prediction and salient object detection as it is successfully used ...
  • Usama, Muhammad (SEECS, National University of Science & Technology, 2015)
    Currently scientists around the world are working to make new discoveries and advancements using e-Science platforms. Modern science relies on computational power and uses large data which often requires grid or utility ...
  • Shaheen, Anjuman (SEECS, National University of Science & Technology, 2015)
    Contrast 3D echocardiography (C3DE) is commonly used to enhance the visual quality of ultrasound images in comparison with non-contrast 3D echocardiography (3DE). Though the image quality in C3DE is perceived to be improved ...
  • Khalid, Nauman (SEECS, National University of Science & Technology, 2015)
    This thesis introduces a exible cloud-based persistency framework that can be used in a wide range of Multi-agent systems. The recent emergence of the Internet of Things has made it possible for us to monitor and manage ...
  • Awan, Ruqayya (SEECS, National University of Science & Technology, 2015)
    Cardiovascular disease is one of the leading causes of deaths worldwide which has resulted into increased usage of the cardiac imaging. There are a number of cardiac imaging modalities, among which echocardiography is the ...
  • Kazim, Muhammad (SEECS, National University of Science & Technology, 2014)
    Virtualization is a primary feature of Cloud computing that enables a sin- gle system to concurrently run multiple isolated virtual machines. A virtual machine uses a single le called disk image to represent the hard ...
  • Ume-e-Ghazia (SEECS, National University of Science & Technology, 2013)
    Cloud computing is the latest computing technology that provides various on demand services to large variety of users. This technology helps large organizations and enterprises by executing large number of processes in ...
  • Iqbal, Sehar (SEECS, National University of Science & Technology, 2014)
    Many scientific studies in Wireless Sensor Networks rely on simulations and correctness of these simulation results is heavily dependent on random numbers. In current situation, most of researchers generally use random ...
  • Habib, Syed Talha (SEECS, National University of Science & Technology, 2014)
    As we are witnessing the emergence of new technologies i.e. Cloud computing, social media and mobile computing new threats and risks are continuously evolving as well. All these threats and risks add to the existing complex ...
  • Faridoon, Osama Bin (SEECS, National University of Science & Technology, 2015)
    The fostering of NFC in everyday tasks and with growth in applications involving contactless transactions based on NFC; there is a requirement from users and industry to address the security issues affecting mobile ...

Search DSpace


Advanced Search

Browse

My Account