DSpace Repository

Browsing DEPARTMENT OF SOFTWARE ENGINEERING by Title

Browsing DEPARTMENT OF SOFTWARE ENGINEERING by Title

Sort by: Order: Results:

  • Rahman, Md. Atikur (Daffodil International University, 2019-12-18)
    Airtel Bangladesh limited is a GSM-based totally cell operator in Bangladesh. Airtel is the 6th cellular cell phone service to go into the Bangladesh market, and initially released business operations underneath the brand ...
  • Biplab, Ekramul Kabir; Trishna, Surovi Akter (Daffodil International University, 2019-05-11)
    Objective: The main goal of the study isto inspect the performance of three Supervised algorithms for improving the Parkinson disease diagnosis by detection. Methods: We used three machine learning techniques for the ...
  • Biplab, Ekramul Kabir; Trishna, Surovi Akter (Daffodil International University, 2019-05-11)
    Objective: The main goal of the study isto inspect the performance of three Supervised algorithms for improving the Parkinson disease diagnosis by detection. Methods: We used three machine learning techniques for the ...
  • Afif, Abidullah (Daffodil International University, 2022-04-10)
    As the term “Internet of Things” (IoT) was first introduced in 1999, our modern society is rapidly developing by these interconnected networks of smart devices. Cutting edge technologies and software engineering can make ...
  • Afif, Abidullah (©Daffodil International University, 2022-01-27)
    As the term “Internet of Things” (IoT) was first introduced in 1999, our modern society is rapidly developing by these interconnected networks of smart devices. Cutting edge technologies and software engineering can make ...
  • Mim, Sumaiya Islam (Daffodil International University, 2022-02-17)
    Analysis of Social Media Platforms provides helpful information for users on social media. Recent papers about user interaction on social media explore methods for predicting user interaction. These analyses of Social ...
  • Shadhin, Khairul Alam (Daffodil International University, 2021-12-31)
    Bioinformatics is the perfect combination of computer as well as biology. We utilize the informatics techniques and imply them on to the biological information to processing genes, genomes, Proteins, sequence, structures ...
  • Deb, Partha Sarothi (Daffodil International University, 2018-12-01)
    Meltdown and Spectre are two of the most dangerous vulnerabilities that are discovered by the researchers of google from “Google zero project”. These vulnerabilities are hardware based processor vulnerability. Sensitive ...
  • Rabbi, MD. Fazly (Daffodil International University, 22-12-18)
    Background and Objectives: Some diseases are related to each other by their metabolic structures. A few examinations showed that Coronary artery disease (CAD), Diabetes mellitus (DM), Parkinson’s Disease (PKD) and Stroke ...
  • Molla, MD Thowhidul Islam (Daffodil International University, 2023-09-12)
    This thesis paper examines the usability and user satisfaction of mobile banking apps in Bangladesh. As mobile banking has become increasingly popular and accessible in the country, it is crucial to assess the effectiveness ...
  • Hasan, Md. Rashedul (Daffodil International University, 2019-12-03)
    The increased usage and popularity of Android devices enables developers of malware to produce new ways to develop malware in various packaged forms in different applications. These malware causes fundamental information ...
  • Russel, Md. Omar Faruque Khan (Daffodil International University, 2019-05-05)
    Android smartphone’s security and privacy of personal information remain threatened because of popularity. Noxious applications represent a danger to the security of the Android. Yet understanding Android malware utilizing ...
  • Tonny, Tasnova Jarin; Mim, Sadia Afrin (Daffodil International University, 2018-12-24)
    Apparel Sales Management System is very helpful for the DIPANPUR to keep their sales record so easily. Here, customers can also choose their product & cart from the site easily.
  • Chowdhury, Samia; Shaju, Sm Shahjalal (Daffodil International University, 2018-12-22)
    The automation of brain tumor segmentation from MRI is an active topic in the field of medical research. Different approaches and methods are being proposed throughout the years to address this challenging task. ...
  • Chowdhury, Samia; Shaju, Sm Shahjalal (Daffodil International University, 2018-12-22)
    The automation of brain tumor segmentation from MRI is an active topic in the field of medical research. Different approaches and methods are being proposed throughout the years to address this challenging task. The ...
  • Islam, Risul (Daffodil International University, 22-01-18)
    Misconfiguration-related failures are becoming a serious issue as web applications get more complex and configurable. One of the main security risks in online applications is the misconfiguration of settings linked to ...
  • Saha, Tithi Rani (Daffodil International University, 2018-12)
    This document is create by “Article Preparation Tool”. This tool is developed for the authors of an article paper to make their life easy to format the manuscript accordingly during the time of preparation. This tool is ...
  • Yahya, MD. (Daffodil International University, 22-12-18)
    Astral Ashes 2.0 is an updated version of the very first built game of mine. I had this project transferred to Unreal Engine 4 from Unity, ultimately unlocking a lot accessibilities for this version of the game. Implementing ...
  • Moniruzzaman, Md (Daffodil International University, 2018-11-12)
    In Attack of township players have to collect resource like food (from animals), wood (from tree). Using the resources they can buy/update buildings, troops etc then using those troops they can occupy other players base. ...
  • Prome, Shanjita Akter (Daffodil International University, 2019-12)
    Currently, in this digital world, the passport is still a physical entity. Each passport contains various security and identity attributes to figure out the owner of the passport and also circumvent attempts at tampering ...

Search DSpace


Browse

My Account