Department of Electronics and Communications Engineering: Recent submissions

  • Juma, Habiba Islam; Raja, Rakibur Rahman; Zaman, Md Rubayat (East West University, 2022-09-28)
    The study details the implementation of two separate machine learning projects referred to as "Credit Card Fraud Detection" and "Bankruptcy Detection," each of which makes use of four unique machine learning models. The ...
  • Akash, Md. Ahsan Kabir; Sarafath, Kazi Zafarullah (East West University, 2022-09-28)
    The hotel management system maintains records of visitors and offers tools for booking, registering, creating bills, entering room rates, etc. Manual systems have drawbacks, such as limited data storage and slow operation. ...
  • Quddus, Md.Shohel; Rafi, Moin Ahmed; Saba, Humayra Akter (East West University, 2022-09-28)
    In fewer than two years, COVID-19, which is widely regarded as the most lethal virus of the twenty-first century, has been responsible for the deaths of millions of people all over the world. The novel coronavirus known ...
  • Yesmin, Suriya; Mim, Sabera; Faisal, Md Fahim (East West University, 2022-09-28)
    In recent years most researchers in different sectors of wireless communication  are analysing to find out maximum channel capacity with the optimal solutions of signal energy at the receiving end of the wireless communication ...
  • Hossain, Md Naim; Hasan, Md Ratul (East West University, 2022-09-28)
    This thesis presents the comparative study and analysis of two different types of routing protocols Proactive and Reactive in MANET. This two routing protocols are basically part of the networking to improve the transmission ...
  • Shaon, Sheikh Shahed Ahmed (East West University, 2022-05-05)
    This paper describes chest X-Ray images classification like Covid-19 infected chest images or normal chest images using various types of deep learning model. These are VGG16(Transfer learning) and CNN (Convolution Neural ...
  • Pal, Swapan; Hasan, Mahamudul; Paul, Amit (East West University, 2022-06-17)
    In recent years, sentiment analysis has become a popular topic of discussion because of the rapid growth of various social media sites and e-commerce sites. At its core sentiment analysis analyze people’s opinion and try ...
  • Ahad, Salman (East West University, 2022-06-17)
    The scale of the COVID-19 epidemic, as well as the global lockdown consequences, are still unknown. However, as events unfold, there has been a rapid fall in social connections, a looming global economic downturn, deaths, ...
  • Hossain, Redoan (East West University, 2022-06-08)
    Ethical hacking word realize us that hacking is for ethical purpose and helping purpose, on the other hand, penetration testing is one of the practical tools in the cybersecurity world and this makes an organization a ...
  • Shaharia, Md. Shafin; Meem, Mimusa Rahman (East West University, 2022-05-30)
    MRI images are commonly utilized in medical science to detect brain tumors. Some types of brain tumors are fatal. As a result, it's critical to figure out which one is lethal so that treatment may begin as soon as possible. ...
  • Tabassum, Syeda Fariha; Yasmin, Nilufa (East West University, 2022-06-06)
    Wearing a mask is one of the non-pharmaceutical strategies that can be utilized to reduce the principal source of SARS-CoV2 droplets ejected by an infected person. Regardless of debates over medical resources and mask ...
  • Anika, Kazi Farzana Islam; Tanzim, Sumaita; Gaice, Fareba Noyshine (East West University, 2022-05-26)
    “A Study on Food-order Using Database Management System.” is a software developed for managing various activities for ordering various kinds of delicious foods. For the past few years, the number of food delivery companies ...
  • Kabir, Sayem; Rahman, Sadia; Biswas, Akash Chandra (East West University, 2022-06-04)
    Today’s world is extremely dependent on the internet, and so as a result, the usage of the internet in all aspects of our life is rapidly rising. The congestion control algorithm is a crucial component of TCP, and it was ...
  • Podder, Ankan; Farhana, Fayeja; Afroze, Farzana (East West University, 2022-05-29)
    With the rapid growth of e-commerce platform, the Fake Review Detection has become a popular and significant topic for both the businesses and research area in recent years. For making a best decision, online reviews play ...
  • Mimu, Sharmin Akter; Rahman, Muhammad Mashiur (East West University, 2020-06-23)
    Energy efficiency and conservation have been a heavily focused subject in recent years. So, the importance of power meter has a significant effect. The thesis aims to develop a Net Meter though IP based IoT by using a ...
  • Yeasmin, Farzana (East West University, 2020-09-17)
    Localization is an important part in wireless sensor network and briefly used it in WSN. Because, from it we get the required information to identify current location of sensor node. Now this become an interest field among ...
  • Ahmed, Radia; Islam, Tariqul; Siam, Mir (East West University, 2020-06-26)
    In a country like Bangladesh plant disease is a common factor. The timely and accurate diagnosis of plant disease plays a very important role in preventing the loss of productivity and loss of reduce quality of agricultural ...
  • Muhammad, Sadi; Vuiya, Md. Jobayer Hossain (East West University, 2022-02-06)
    The study outlines the simulation of two pulse generators for the enhancement of optical fiber access transmission networks with flow rates of 5 and 10 Gbps and transmission ranges of 50 km, 100 km, and 150 km. Gaussian ...
  • Ayat, Shams Ahmed; Sarkar, Shusmita; Kabir, Fariha (East West University, 2020-04-24)
    we described wireless attacks and security protocols briefly. As security for a wireless network is a very important issue, attacks faced by a wireless network should be analyzed. Our research aims to understand the security ...
  • Luna, Sadiya Islam (East West University, 2020-04-22)
    The Man-In-The-Middle (MITM) attack is among the most well-known threats in the field of computer cyber security, one of the major issues for security analysts. MITM focuses on the specific data flowing between both the ...

Search DSpace


Browse

My Account