This document lists 55 potential computer science project ideas spanning several domains including robotics, machine learning, networking, mobile applications, and systems. The projects involve developing automated systems, building identification and management tools, designing voting and quiz systems using wireless technologies, optimizing energy usage in real-time systems, and more. Security and privacy are also common themes with projects focused on anonymizing data, detecting denial of service attacks, and identifying black hat communities on networks.
Download as DOC, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
669 views
Computer Science Projects
This document lists 55 potential computer science project ideas spanning several domains including robotics, machine learning, networking, mobile applications, and systems. The projects involve developing automated systems, building identification and management tools, designing voting and quiz systems using wireless technologies, optimizing energy usage in real-time systems, and more. Security and privacy are also common themes with projects focused on anonymizing data, detecting denial of service attacks, and identifying black hat communities on networks.
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2
Computer Science Projects
1. Automated Robot for Military System (ARMS)
2. Unique ID (UID) Management System Project 3. Online Voting Using Bluetooth Enabled Mobile Phone 4. Wi-Fi Based Mobile Quiz 5. Inter-Operability of 802.11e and 802.11 6. Semi-Supervised Learning using Graph Kernels 7. Gram-Based Fuzzy Keyword Search over Encrypted Data in Cloud Computing 8. Battery Optimizer for Android Mobile Devices 9. Visual Tracking Using Spare Appearance Model 10. Sockets Programming in Python Building a Python Chat Server 11. Security Issue of Cloud Based Storage 12. Pre Touch Sensing with Sea Shell Effect 13. Efficient Peer to Peer Similarity Query Processing for High dimensional Data 14. CALTOOL Computer Aided Learning Tool 15. XTC Algorithm Based Scalable Wireless Ad hoc Networking IEEE 16. Honey Pots a Security System to Identify Black Hat Community in the Networks 17. Elevator Control System 18. Web-Based Online Library System 19. Efficient Coding Technique for Aerospace Tele Command System 20. Microcontroller-Based Security System using Sonar 21. Tanrox Work Force 22. SPIRIT Spontaneous Information and Resource Sharing 23. Software Engineering of Scientific Software 24. Energy & Power Efficient, Real Time System Scheduling 25. Data-Efficient Robot Reinforcement Learning 26. Gaussian Processes for Bayesian State Estimation 27. Imitation Learning in Humanoid Robots 28. Privacy Preserving Data Sharing with Anonymous ID Assignment 29. SORT- a Self-Organizing Trust Model for Peer-to-Peer Systems
30. Information Flow in Bargaining Scenarios
31. Simulation and Exploration of Hybrid Systems via Automata 32. Combining Kinect and Stereo Depth Measurements 33. Band-Aids for Broken Microprocessors 34. North East West South Global Unified Reporting Utility (NEWSGURU) 35. Mobile Apps in the K-12 Classroom 36. Diagnosing Computer Bugs Using Big Data 37. A Railway Anti-collision System with Phis Plate Removal Sensing and Auto Track Changing 38. A Reverse Engineering Approach for Converting Conventional Turbo C Code to 64bit C# 39. Debugging Grids with Machine Learning Techniques 40. SMASH-Scalable Multimedia Content Analysis in a High-level Language 41. The Design and Implementation of a Consolidated Middle Box Architecture 42. Automated Low-Level Analysis and Description of Diverse Intelligent Videos (ALADDIN) 43. 3D Mobile Game Engine Development Software Project 44. Coaching Management Software 45. Bug Tracking System 46. Development of a Feature-Rich Practical Online Leave Management System (LMS) 47. Design and Development of Speed Cash System (SCS) 48. Multi-Million Dollar Maintenance Using WLS Algorithms 49. DDOS (Distributed Denial of Service) Using Throttle Algorithm 50. File System Simulation 51. Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing 52. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentica 53. Development of Data leakage detection using data allocation strategies 54. Iris recognition unsing standard cameras 55. Hospital management system in VB.net