≡ Menu

Computer Science Projects

Computer science deals with scientific study involving computers and uses of computers in computation, systems control, data processing, advanced algorithms and Artificial Intelligence. Students enrolled for computer science courses need to undertake projects during their course which has much to do with designing, programming, theories and analysis. All computer science projects focus on developing and designing different application-based software. They can be implemented by a variety of tools like .NET or Java. You can use any of these following project ideas to home your presentation skills and widen your knowhow on the topics:

  1. Storage Systems Based HBA Distributed Meta Data Management for large Cluster
  2. Image Analysis and Compression with PSNR and MSE Technique
  3. Implementation of Threshold Cryptography for MANET Based on Elliptic Curve Cryptography
  4. Image Processing for Resizing and Bilinear Filters
  5. Architecture of Distributed Database in Next Generation Mobile Networks for Global RoamingGraph-based Recommendation on Social Networks
  6. Adaptive Multi-agent System For Traffic Monitoring
  7. Architectural Risk Analysis of Software Systems Based on Security Patterns
  8. Providing Architectural Languages and Tools Interoperability through Model Transformation Technologies
  9. Channel Diversity in Wireless Mesh Network
  10. Recognition of Hand Movement for Paralytic Persons Based on a Neural Network
  11. Network Security Implementation Layer through Voice Biometric
  12. Agent Based Blocking and Response, Intrusion Detection using Signature
  13. Load Balancing of Artificial Intelligence Network using Ant Colony Optimization
  14. Authentication and Adaptive Security for DNS System
  15. Multicasting of Bandwidth Efficient Video in Multiradio Multicellular Wireless networks
  16. Blog Mining and Emotion Argumentation
  17. Automatic Alert Alarming For Security Systems
  18. Automated Parking System using RFID Technology
  19. Predicting Missing items in Shopping Carts
  20. Application Layer Traffic Optimization in the e-Mule System
  21. Efficient Peer-to-Peer Similarity Query Processing for High-dimensional Data
  22. Screen Shot Grabber
  23. Motion Detection and Instant Alerter
  24. Java Based Fire Alarm System
  25. Enhanced Search Engine
  26. Dynamic Signature Verification Using Pattern Recognition
  27. Distributed Load Sharing In Mobile Environment: to completely eliminate congestion in mobile environment so as to avoid data loss and increase the rate of transmission.
  28. Disease Identification using WBC Count
  29. Database Synchronization: allows you to take one database, make an exact copy of it on another server, and set one of them to take all its updates from the other.
  30. Data Mining For Credit Card Application Processing
  31. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
  32. Social Surroundings Bridging the Virtual and Physical Divide
  33. Requirements for Distributed Event-based Awareness in PP Groupware Systems
  34. Data Mining Approach for Detecting Higher Level Clones in Software
  35. Exception Handling Patterns for Process Modeling
  36. A Quadratic Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
  37. An Improvement in Apriori algorithm Using Profit And Quantity
  38. Data Leakage Detection: proposes data allocation strategies to improve the probability of identifying leakages. In some cases “realistic but fake” data records may even be injected to further improve chances of detecting leakages and identifying the guilty parties.
  39. Biometric Authentication System Using the Human Ear
  40. Battery Optimizer for Android Mobile Devices
  41. Android Application for Call Taxi
  42. Advanced 3D Maps for Personal Digital Assistant
  43. Accessing a Network Using Secure Mobile Communications
  44. Access My PC
  45. 3D Graphics Library for Mobile Applications: to develop a 3D graphics library for embedded systems like Mobiles. The library is created for the basic APIs that will be able to produce a 3D moving object into the screen. These sub-sets of API contain the basic operations that are necessary for rendering 3D pictures, games, and movies.
  46. Face Detection Using Template Matching: Face detection is concerned with finding whether or not there are any faces in a given image and returns the image location and content of each face.
  47. Voice based E-mail for the Blind
  48. A Railway Anti-Collision System with Auto-Track Changing and Phis Plate Removal Sensing
  49. Computer Folders ‘Security with a Bluetooth-Enabled Mobile Phone and Rinjdal Security Extension
  50. Speech Stress Analysis based Cheap Lie Detector for Loyalty Test
  51. Credit Card Reader with Face Recognition based on Webcam
  52. Load Shedding In Mobile Systems Using Mobiqual
  53. Adaptive Coaching and Co-Operative System for MANETS
  54. Multidimensional and Color Imaging Projections
  55. Inter Domain Packet Filters based Controlling of IP Spoofing
  56. Hidden Markov Models Based Credit Card Fraud Detection
  57. XML Enable SQL Server Based Data Storage and Minimization
  58. Multithreaded Socket Based Email Server
  59. Design and implementation of Mobile Banking
  60. JMX Based Managing and Monitoring the Clusters
  61. Implementation of Multi Router Traffic Monitoring
  62. Real Time Transmission Protocol Based Broadcasting of Multicast Video
  63. Data Warehousing and Data Mining Dictionary
  64. Fuzzy Keyword Search in Cloud Computing over Encrypted Data
  65. Web Based Online Blood Donation System
  66. Web Based Graphical Password Authentication System
  67. Identification and Matching of Robust-Face Name Graph for Movie Character
  68. Multicast Routing For Collaborative Applications with Delay Variation Constrains On Overlay Networks
  69. Near-Optimal Multicast Scheme Using a Hybrid Genetic Algorithm for Hoc and Mobile Networks
  70. SNMP Based Network Monitoring and Analyzer Tool
  71. Network Border Patrol for Promoting Fairness in the Internet and Preventing Congestion Collapse
  72. Recognition of Digits Back Propagation and Handwritten Based on Neural Network
  73. Artificial Neural Network Based Verification of Digital Signature
  74. Design and Implementation of E Secure Transaction
  75. Pattern Recognition and Dynamic Character Using Neural Network
  76. Verification of Dynamic Signature Using Pattern Signature
  77. Data Integrity Maintenance and Dynamic University Linking
  78. Filtering and Analyzing of Effective Packet System for ATM Network
  79. Detecting Suspicious Motion with Nonimaging Sensors
  80. KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
  81. Web-based Personal Health Records Filtering using Fuzzy Prototypes and Data Quality Criteria
  82. Robust Runtime Optimization of Data Transfer in Queries over Web Services
  83. ATM Reporting system
  84. E-Mail Campaign System
  85. Mingle Box
  86. Trade Service Engine
  87. SMTP Mail Server
  88. Virtual Shopping
  89. Digest Algorithm for Efficient Message for Data Security
  90. By Using Concurrent Engineering Train Simulation Based on Genetic Algorithm
  91. Travelling Salesman and Genetic Algorithm Problem Using ATL COM and C#
  92. Channel Rate Allocation for Scalable Video Streaming Using Genetic Algorithm over Error-Prone Networks Based on GOP
  93. High Speed Face Recognition Based on RBF Neural Networks and Discrete Cosine Transform
  94. Automatic Removal and Estimation of Noise in From a Single Image
  95. Dynamic Time Warping and Triangular matching Based on a Fingerprint Verification System
  96. Smart Card Security and Static Analysis Perspective from a Java
  97. Internet Based Monitoring of Remote Electrocardiogram
  98. Internet Protocol Trace Back Based Detection and Modeling of Camouflaging Worm
  99. Ridges and Fusion of Minutiae Based Fingerprint Identification Using Strength Factors
  100. Bullet Physics and Cinder Graphics Based Doodle Processing System

Comments on this entry are closed.

Next post:

Previous post: