Computer Science Projects

Latest 2013-2014 final year Computer Science projects, Mini projects, IEEE Project Topics, Project Ideas for CSE, I.T Engineering , MCA, MSc students with Abstract, Source Code, Reports in C, Java, .Net, PHP and Android. Project reports are provided at the end of each article.

Turing Machine Simulator

To simulate given transitions on an input specified and sees if the Turing machine successfully execute the input.The TURING program simulates the operation of a Turing Machine. Turing Machines are abstract models of primitive digital computers. In fact, they are the most fundamental models of all logical computations. Such a machine was conceived by the British mathematician Alan Turing in 1935, long before digital computers became established. Turing also worked on machines to break the secret codes produced by the German Enigma machine in World War II. TURING provides a tape with 999 elements, all of which must be 0 or 1. These are unary digits, NOT BINARY digits. In addition, the state transition table can hold up to 99 states. These two capacities should be more than adequate for the demonstration nature of this program. In addition, TURING has a full-screen editor so that users may write, edit, and save their Turing Machine programs. You can also vary the speed of animation and can run programs in either an automatic mode or a single-step mode. Three sample demonstration programs are included in the files called TDEMO1.TXT, TDEMO2.TXT, and TDEMO3.TXT. There is also an independent tutorial file, TURING.TXT, which is for first-time users. TURING.TXT may be imported into any word processor and/or printed on any printer. 

User Trainable Fact Extractor For Unstructured Text

Named entity recognition is a sub task of information extraction that seeks to locate and classify atomic elements or facts in text into predefined categories such as the names of persons, organizations, locations, expressions of times, quantities, monetary values, percentages, etc. User trainable named entity extractor is a project on named entity recognition. Named entity recognition comes under the field of Natural Language Processing of the branch of Artificial Intelligence. The goal of the project is to develop a user trainable tool which can extract named entities from an unstructured text. Various domains will have various set of entities. Using regular expressions, specifications for the rules as per the set of possible strings that the user wants to match is made. Pattern Matching involves a search for the required entity through the various sentences in the given text. If a match is found, then the obtained match will be highlighted else there will be no change to the document.

Voice Recognizing Games

Voice Recognizing games is used to play games without the help of any physical devices such as keyboards, mouse, game pads, etc. Games can be controlled using human voice, which is easier, portable and efficient than any other physical device. The goal of the project is to develop a system which recognizes voice of any user with any accent by training the system so as to increase its confidence level for the user. Voice commands are recognized with a high confidence level and the recognized voice command is linked to a particular word which is then written into a file. By using X11 programming, an event driven programming, the recognized words which are written into the file acts as events to trigger a task, such as a keystroke. Thus by using both, a trainable speech recognizer and X11 programming, we are able to use voice instead of a keyboard and thus play games using voice.

Web Password Hashing And Domain Specific Hashing

One of the most important security features used today are passwords. It is important to have secure, unguessable passwords. In order to ensure the security to websites we enable the hashed password instead of the actual one. Password hashing is a way of encrypting a password before it's stored in the database. As a result the site only sees a domain specific hash of the password. Generally users tend to use a single password at many different web sites. Here the user’s password is transparently converted into a domain specific password. Major advantages of domain specific hashing is that it provides a defense against password phishing. Two hashing algorithms are developed and passwords are hashed through them. The strength of these hashed passwords are compared and their similarity is found out. Hashed passwords along with their similarity is then stored in the database. Later the webpage framework is developed using python Bottle and authenticated. Now let us have a look at different hashing algorithms.

WebGL - The Start Of A Revolution

This project is all about demonstrating the capabilities of a new technology known as WebGL. WebGL is a standard created by Khronos (the creators/maintainers of OpenGL standard) and is a Web Based Graphics Library, based on OpenGL ES 2.0 ,that extends the capability of the JavaScript programming language to allow it to generate interactive 3D graphics within any compatible web browser. WebGL is a context of the canvas HTML element that provides a 3D computer graphics API without the use of plugins. WebGL is not exactly HTML5. It extends HTML5 by utilizing the HTML5 Canvas element. WebGL came out of Canvas 3D experiments by Vladimir Vukicevic from Mozilla, prototyped in 2006. The group consists of Apple,Google, Mozilla, and Opera.

IEEE 1394 interface to receive data from Digital Video

The IEEE 1394 interface is a serial bus interface standard for high speed communications and synchronous real time data transfer, frequently used by personal computers, as well as in digital audio, digital video, automotive, and aeronautics applications. This project entails utilizing this interface to receive the input from a DV camera. Digital Video (DV) is a standard protocol used by some digital camcorders. All DV cameras that recorded to tape media had a Fire Wire interface (usually a 4-conductor). Key features of IEEE 1394 Firewire are

Image Story Teller

The aim of the project is to develop a software which will convert a text story into its corresponding image story. This software can represent a simple or even a big story with images corresponding to each sentence in the story. Each sentence of the given story is analyzed for its meaning and matching images are extracted from the web using Google Search Engine. The sentences are replaced by images which can convey the meaning of the text data, so that, the user obtains an image story line as an output for the text story line given as input. For finding which all words in each sentence make it meaningful, we make use of the NLTK module available in Python. At first, each word in the given story is tokenized using the tokenizer available in Python.

Indoor Skeleton Modelling Using Ultrasonic Sensors

Indoor Skeleton Modelling using Ultrasonic Sensors is an implementation of software along with hardware to do just what its name implies: to model any indoor room or building using arduino and ultrasonic sensors by capturing and processing the distance. Arduino is an open-source single-board micro controller, designed to make the process of using electronics in multidisciplinary projects more accessible. Ultrasonic sensors are required to perform measurements between moving or stationary objects. The ultrasonic sensors generate high frequency sound waves and evaluate the echo which is received back by the sensor. Sensors calculate the time interval between sending the signal and receiving the echo to determine the distance to an object. The distance from these sensors provide the dimensions required for developing the desired 3D model of a room or a building. This distance is send to the OpenGL program in the PC developed using OpenGL interface. The program processes the data received using the appropriate functions available and create a 3D model of the desired room or building. This model is displayed on the created window.

Retrieve code of tag and card using a RFID reader

The project intelligent accessories  is all about retrieving code of tag and card using a RFID reader based on a RFID technology. and to fetch corresponding data from a database and send this data as a message to a number mentioned in the database, as output. The languages we have used for accomplishing this task are PYTHON and MySQL. PYTHON is an interpreter, general purpose high level programming language its use of indention for block delimiters is unique among popular programming languages. PYTHON is often used as a scripting language but is also used in a wide range of non scripting contexts.

Intelligent Web Search Engine

As no of search engines and websites increase, need of the hour is to have a efficient and user friendly search methods. Now a days lot websites owners indulge in Black Hat SEO techniques in order to reach of the search results. Even though search engines like Google, keeps on updating the search engine algorithm like Panda and Penguin updates,  mechanisms to assisting web search and retrieval process are limited, due to lack of access to semantics of a documents  and also due to the problems that exists in providing suitable search patterns. These limitations can be overcomed up to an extent by latest advancement in intelligent search by providing search engines with more intelligence and with user’s underlying knowledge. This projects aims to improve the search intelligence by using the natural language tool kit. By using natural language processing the user gets more accurate and correct results. The search engine is implemented using the languages python and PHP. 

Popular Videos

How to speak to people

How to speak so that people want to listen.

Got a tip or Question?
Let us know