Thesis: Recent submissions

  • Azad, Shehreen; Sayed, Abdullah Abu; Faiyrooz, Noshin (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Indoor object detection is a challenging area of computer vision where comparatively lesser work has been done compared to its outdoor counterpart. Surely, such a task requires huge amount of training data to make any ...
  • Shuvro, Ali Abir; Khan, Mohammad Shian; Rahman, Monzur (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Intelligent Transportation Systems(ITS) provides services for proper traffic assistance. Vehicular Ad-hoc Network(VANET) provides internet connectivity to vehicles and helps in traffic guidance. In this paper, traffic flow ...
  • Mushabbir, Mueeze Al; Alamgir, Refaat Mohammad; Humdoon, Ahmed Azaz (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    With the vast amount of information available on the Internet, finding answers to questions is as important as ever in today’s day and age. In Natural Language Processing Research, Question Answering (QA) and Query-based ...
  • Nahin, Shahriar Nur; Imam, Kazi Fahim; Rahman, Nabil; Tasnim, Anika (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    This report summarizes the attempt to find the way towards building an Optical Character Recognition System for handwritten Bangla characters. The complex and unique structure of scripts like Bangla and ever challenging ...
  • Ahmed, Zarif; Siddiqi, Chowdhury Nur e Alam; Alam, Fardifa Fathmiul (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-04-30)
    Nuclei instance segmentation is an important step for oncological diagnosis and pathology research of cancer. HE stained images are considered the gold standard for medical diagnosis. But before being used for segmentation, ...
  • Samin, Abid Ahsan; Hassan, Abdullah; Khan, Md. Rakib Hossain (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Identifying 3D objects with computer vision in a precise manner has been a challenging task in the field of autonomous driving. Partly because it requires proper depth estimation. Until now, Li-DAR technology has been ...
  • Haque, Amira; Rahman, Mirza Zamiur; Sayera, Reeshoon (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Hand gestures represent spatiotemporal body language conveyed by various aspects of the hand, such as the palm, shape of the hand, and finger position, with the aim of conveying a particular message to the recipient. ...
  • Hossen, Md. Sakhawat (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Device to device (D2D) communication in underlay inband mode is the most beneficial as sharing the radio resources of existing cellular users with the D2D pairs increases the system capacity. The D2D pairs can communicate ...
  • Kabir, Md. Mohsinul (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    In clinical psychology, diagnostic of mental illness is mostly done by patient’s self reported experiences, behaviors reported by the patients themselves, their relatives and a mental status examination. This method can ...
  • Kabir, Mohammad Ridwan (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-04-30)
    Disabilities of the upper limb, which may be caused either due to accidents, neurological disorders, or even birth defects, impose limitations and restrictions on the interaction with a computer for the concerned individuals, ...
  • Ferdows, Rubayea (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Many social network (SN) applications such as Facebook, Twitter, Instagram, etc. provide many benefits that allow users to connect, follow each other, share various content, and influence them to engage in various activities ...
  • Hussain, Faisal (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Device to device (D2D) communication in underlay mode is the most desirable since it improves bandwidth utilization by sharing the radio resources of existing cellular users with D2D pairs. The D2D pairs are able to interact ...
  • Ashmafee, Md. Hamjajul (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    Nowadays, visual interactive systems (Vis) are attracting more attention in research and industries because of their effectiveness in conveying information. Additionally, to make rational decisions based on extracted data, ...
  • Hasan, Md. Bakhtiar (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    The most significant work for a service supervisor is to discover hidden flaws in car engines in order to control the engines to be safe and increase the reliability of vehicle systems. We will provide a STUDY THE METHODOLOGY ...
  • Afrin, Shahida (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-30)
    In this article, the use of an EMG control based wheelchair is presented. The me- chanical design is based on six gestures and eight channel EMG sensors that are controlled by six hand directions. Electric EMG-based ...
  • Ahmed, Sabbir (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-07-30)
    To ensure global food security and the overall profit of stakeholders, the importance of correctly detecting and classifying plant diseases is paramount. In this regard, the emergence of Deep Learning-based architectures ...
  • Aziz, Md. Ashif; Mehjabin, Nafisa; Tasnia, Khandaker Rifah (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-31)
    Nowadays software applications are used for diverse purposes. With the explosion of the web and mobile experiences, system design fully depends on who is using the application. For the success of the application, developers ...
  • Karim, Mahbul; Muntakim, Afia; Zaman, Hridita Nur (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-31)
    The biggest challenge we face today is web security. It is the fundamental framework for the global data society. People’s daily activities mostly depend on internet-based applications. No web application is free from ...
  • Meem, Jarin Tanzim; Yasmin, Khan Silvi; Ruhee, Rokeya Samantha (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-31)
    Blockchain has emerged as one of the most significant technological breakthroughs in software design and technology over the past ten years. Existing blockchain architectures have two major limitations: first, the ...
  • Islam, Md. Rafid; Rahman, Ratun; Ahmed, Akib (Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh, 2022-05-31)
    Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. It also presents a brief review of malware ...

Search IUT Repository


Advanced Search

Browse

My Account