<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Thesis 2020</title>
<link href="http://dspace.ewubd.edu:8080/handle/123456789/3489" rel="alternate"/>
<subtitle/>
<id>http://dspace.ewubd.edu:8080/handle/123456789/3489</id>
<updated>2026-04-04T15:04:31Z</updated>
<dc:date>2026-04-04T15:04:31Z</dc:date>
<entry>
<title>Wireless Security/</title>
<link href="http://dspace.ewubd.edu:8080/handle/123456789/3675" rel="alternate"/>
<author>
<name>Ayat, Shams Ahmed; Sarkar, Shusmita; Kabir, Fariha</name>
</author>
<id>http://dspace.ewubd.edu:8080/handle/123456789/3675</id>
<updated>2022-08-03T04:41:52Z</updated>
<published>2020-04-24T00:00:00Z</published>
<summary type="text">Wireless Security/
Ayat, Shams Ahmed; Sarkar, Shusmita; Kabir, Fariha
we described wireless attacks and security protocols briefly. As security for a wireless network is a very important issue, attacks faced by a wireless network should be analyzed. Our research aims to understand the security issues in a Wireless Sensor Networks system and protocols that can be used to combat the issues. This paper will give an idea about past security issues and vulnerabilities as well as present issues and vulnerabilities in different cases and the security protocols that can be considered. Some common attacks and attack issues in Ad-hoc Mobile network with 4G and 5G wireless network systems are analyzed in terms of security challenges and combating ideas both established and proposed. This paper describes the security protocols based on network fields like Ad-hoc Mobile network systems, 4G &amp; 5G cellular networks and, helps with solutions to the vulnerabilities of the common and special attacks in such fields.
This thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering of East West University, Dhaka, Bangladesh.
</summary>
<dc:date>2020-04-24T00:00:00Z</dc:date>
</entry>
<entry>
<title>Man-in-the–Middle Attack</title>
<link href="http://dspace.ewubd.edu:8080/handle/123456789/3661" rel="alternate"/>
<author>
<name>Luna, Sadiya Islam</name>
</author>
<id>http://dspace.ewubd.edu:8080/handle/123456789/3661</id>
<updated>2022-07-28T10:21:25Z</updated>
<published>2020-04-22T00:00:00Z</published>
<summary type="text">Man-in-the–Middle Attack
Luna, Sadiya Islam
The Man-In-The-Middle (MITM) attack is among the most well-known threats in the&#13;
field of computer cyber security, one of the major issues for security analysts. MITM&#13;
focuses on the specific data flowing between both the endpoints and the data security and&#13;
integrity of information itself. These attacks had led to a terrifying loss of data. This&#13;
project attempted to describe the specifics of MITM attacks, detection, and prevention&#13;
mechanisms. In this paper, the literature on MITM is studied extensively to analyze and&#13;
categorize the scope of MITM attacks In general, classify MITM attacks based on several&#13;
criteria, such as the position of its attacker on a network, and malicious strategies. Based&#13;
on the list of impersonation methods, include effective solutions for the prevention of&#13;
measures for every MITM classification. The implementation of how to mitigate and&#13;
detect attacks against MITM has been performed with the help of virtualization tools.&#13;
This study would help to provide a better understanding of the facts, and it will also&#13;
propose the significance of the solution to important MITM attacks that have been&#13;
described in the paper.
This thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering of East West University, Dhaka, Bangladesh.
</summary>
<dc:date>2020-04-22T00:00:00Z</dc:date>
</entry>
<entry>
<title>Hostel Management System</title>
<link href="http://dspace.ewubd.edu:8080/handle/123456789/3565" rel="alternate"/>
<author>
<name>Jahan, Israt</name>
</author>
<author>
<name>Chow., Samsunnahar</name>
</author>
<author>
<name>Rokib, Md. Tow qul Islam</name>
</author>
<id>http://dspace.ewubd.edu:8080/handle/123456789/3565</id>
<updated>2022-05-31T10:01:55Z</updated>
<published>2020-06-12T00:00:00Z</published>
<summary type="text">Hostel Management System
Jahan, Israt; Chow., Samsunnahar; Rokib, Md. Tow qul Islam
"Hostel Management System" is a software developed for managing various activities in the hostel. For the past few years the number of educational institutions are&#13;
increasing rapidly. Thereby the number of hostels are also increasing for the accommodation of the students studying in the institution. The particular project deals with&#13;
the problems on managing a hostel and avoids the problems which occur when carried&#13;
manually. In the system we can easily manage hostel details, room details, student&#13;
records, mess expenditure, mess bill calculation, easy way of room allocation and hostel&#13;
attendance. We can improve the efficiency of the system.
This thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Electronics and communication Engineering of East West University, Dhaka, Bangladesh
</summary>
<dc:date>2020-06-12T00:00:00Z</dc:date>
</entry>
<entry>
<title>Basic Study of IPv4 and IPv6</title>
<link href="http://dspace.ewubd.edu:8080/handle/123456789/3564" rel="alternate"/>
<author>
<name>Sarkar, Md. Sagir Ahmed</name>
</author>
<author>
<name>Anik, Asif Ishtiaqe</name>
</author>
<id>http://dspace.ewubd.edu:8080/handle/123456789/3564</id>
<updated>2022-05-26T05:31:45Z</updated>
<published>2020-05-02T00:00:00Z</published>
<summary type="text">Basic Study of IPv4 and IPv6
Sarkar, Md. Sagir Ahmed; Anik, Asif Ishtiaqe
This paper aims at evaluating, compare and report result based on the performance of two protocol stacks (IPv4 and IPv6) in terms of various parameters that is analyzed when the data is being transmitted from one client to another or to a server over a wired network on IPv4 in comparison with the IPv6, thus proposing a system that compares both IPv4 and IPv6. The issue of the new-generation numbering system of the Internet Protocol version 6 (IPv6) is addressed as exhaustion of address space of the numbering system of Internet Protocol version 4 (IPv4) becomes a problem. IPv4/IPv6 transition unfolds a lot of problems relating to the internet world. This paper proposes some transition mechanisms involving different transition techniques. An explained study is performed on the addressing architecture.&#13;
However these techniques prove to be most efficient in the study which has been performed. This paper targets at a comparative study on the throughputs in bits/ seconds, packet throughputs, delay in networks, response time in seconds of both IPv4 and IPv6. Hence, since the system proposes for co-existence of both IPv4 and IPv6, the solution projected the comparison between the two.
This thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Electronics and communication Engineering of East West University, Dhaka, Bangladesh
</summary>
<dc:date>2020-05-02T00:00:00Z</dc:date>
</entry>
</feed>
