Student ID |
Thesis Title |
090591, 0905099 |
Improving PreDeConWith Graph Based Approach |
0905012 |
Protecting Mobile Users From Visual Privacy Attacks |
0905092, 0905098 |
Positional and Participation Dynamicity of Longitudinal Social Networks |
0905107 |
On Determining the Hamiltonicity of a graph from its all-pair-shortest-path matrix |
0905044, 0905083 |
Electronic Health Record : Bangladesh Perspective |
0905068 |
Reputation Computing in File Sharing Based on Authenticity |
0905014, 0905021 |
A Study on Recent Fast Ways of Hypervolume Calculation for MOEAs |
0905066, 0906113 |
The Study of Reliable Social Sensing |
0805094 |
Optimization of ZEM Algorithm in Prediction of RNA Secondary Structure |
0905020, 0905001, 0905013 |
Photoplethysmographic Analysis of Optical Signals: A Single Device to Measure All the Vital Signs |
0905027 |
Isolated Independent Handwritten Bangla OCR(Optical Character Recognition) |
0905062, 0905067, 0905071 |
Graceful Labeling of a Special Class of tree |
0905060 |
eWatchdog: An Electronic Watchdog for Unobtrusive Emotion Detection based on Usage Analysis |
0905088, 0905097 |
Comparing algorithms for Structured Motifs Search |
0905069, 0905104 |
A Novel Approach to Identify Spatio-Temporal Crime Patterns in Dhaka City |
0905105, 0905110 |
Remote Health Monitoring in the Context of Bangladesh |
0905016, 0905017, 0905061 |
m-Government : Ensuring Hassle Free Citizen Services Through Mobile Phone |
0905019 |
Improving Random Immigrants Injections for Dynamic Multi-objective Optimization Problems |
0905007, 0905047 |
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities |
0805098 |
Noise Reduction from Cellular Biological Images Using Adaptive Fuzzy Filter |
0905059, 0905100 |
Security Challenges in Vehicular Cloud Computing |
0905096, 0905035 |
SuperCrypt: A Novel Technique of Quantum Cryptography Simultaneously Improving Both Security Level and Data Rate |
0905078 |
Identity Deception Detection in Facebook Using Nonverbal Behavior |
0905011 |
SmartAttacker: Towards Developing an Attacker Exploiting Artificial Intelligence |
0905026 |
Educational Data Mining for Secondary and Higher Secondary Education in Bangladesh |
0905039, 0905003 |
Balanced k-Coverage in Visual Sensor Networks |
0905077, 0905010 |
Recurrent Breast Cancer Detection Based on Association Rules Using Frequent Itemset Mining |
0905056, 0905090 |
Clean your city efficiently with limited resource you have |
0905074, 0905108 |
A Crowd-Enabled Approach for Efficient Processing of Nearest Neighbor Queries in Incomplete Databases |
0905048 |
Chameleon: A Novel System for Defending Eavesdropping of Secret Information |
0905085, 0905073 |
Dynamic Resource Provisioning for Video Transcoding in IaaS Cloud |
0905030, 0905119 |
E-Learning of ICT Course in Higher Secondary Level |
0905115, 0905117 |
A New Algorithm for Solving Many-objective Optimization Problem |
0905008 |
A Tale of Institutional Education: Students’ Perspective |
0905029, 0905041 |
Wireless Sensor Network Integretion With Cloud Computing |
0905063, 0905114 |
Opportunistic Strategies for Keeping Push Notification Channels Alive on Smart Devices |
0905034, 0905051 |
Analyzing Planning Domains For Task Decomposition |
0905018, 0905053 |
Scalable Processing of Call Detail Records for Community Detection |
0905002, 0905093 |
Can We Predict Eat Out Behavior of a Person from Tweets and Check-ins? |
0905042, 0905055 |
Authentication of kNearest Neighbor Queries in the Presence of Obstacles |
0905102, 0905103 |
An Approach to Face Recognition System Using Principal Component Analysis (PCA) |
0905075, 0905082 |
Representing AI problems expressed in PDDL to Unified Modeling Language diagrams |
0905036, 0905040, 0905043 |
A Comparative Analysis of PDDL-Based Planning Using Multiple AI Planners |
0905076, 0905079 |
A Data Warehouse Structure on Pathological Data of Bangladesh |
0905004, 0905086 |
Predicting in vivo binding sites of RNA-binding proteins using mRNA secondary structure |
0905009, 0905022, 0905049 |
Viral Video Spread Over Human Space |
0905005, 0905050, 0905054 |
MediaServ: Resource Optimization in Subscription based Media Crowdsourcing |
0905087, 0905118 |
Segmentation of Hand Written Text Document |
0905111, 0905024 |
Code Injection In HTML5 And Java Based Android Apps |
0905065, 0905095 |
Protein Threading Optimization Using Consensus Homology Modeling |
0905045, 0905006 |
Shortest Path in Large Graph : A Memory Efficient Exact Method |
0905058 |
Runtime Authentication in Highly-Secured Network Systems |
0905109 |
Identification Of Traffic Jam Using Call Detail Records |
0905084, 0905089 |
Energy-Efficient Scheduling Heuristic for Directional Sensors in Wireless Visual Sensor Networks |
0905072, 0905046, 0905094 |
Behavioral Malware Detection Approaches for Android |
0905028, 0905055 |
Protecting Genomic Privacy in Medical Tests using Distributed Storage |
0905015, 0905032 |
GPS Based Energy Efficient Fast Proxy Mobile IPv6 Handover |
905031, 0905023 |
Iris Recognition using Hamming Distance and Neural Network |
0905080, 0905116 |
Uniform Embedding for Efficient JPEG Steganography |