Computer Science Projects

Latest 2013-2014 final year Computer Science projects, Mini projects, IEEE Project Topics, Project Ideas for CSE, I.T Engineering , MCA, MSc students with Abstract, Source Code, Reports in C, Java, .Net, PHP and Android. Project reports are provided at the end of each article.

Computational Metaphor Extraction And Interpretation

Aim of this project is to determine whether a word in a sentence is being used metaphorically, and uses a metaphoric mapping to interpret it. A metaphor is a figure of speech in which the unfamiliar is expressed in terms of the familiar. However, it is not always necessary that the word may be used as a metaphor. It is very difficult for the systems to understand the metaphor. Proposed system extracts relevant words from a sentence and comparison with a pool of stored metaphor's in the database. If artificial intelligence is used in this project, we can increase the accuracy of the system.

There are many proven systems in the market which identify metaphors. One of them is CorMet. It is a metaphorical corpus based system for mappings between concepts.It does this by finding systematic variations in domain-specific selectional preferences, which are inferred from large, dynamically mined Internet corpora. Metaphors are transferred from source to a target domain, thus by making metaphors in the both source and target domain equal. The verbs that select for a concept in the source domain tend to select for its metaphorical equivalent in the target domain. This regularity, detectable with a shallow linguistic analysis, is used to find the metaphorical inter concept mappings, which can then be used to infer the existence of higher level conventional metaphors.

Scalable Learning Of Collective Behaviour

This study of collective behavior is to understand how individuals behave in a social networking environment. Oceans of data generated by social media like Face book,Twitter, Flicker, and YouTube present opportunities and challenges to study collective behavior on a large scale. In this work, we aim to learn to predict collective behavior in social media. In particular, given information about some individuals, how can we infer the behavior of unobserved individuals in the same network ? A social-dimension-based approach has been shown effective in addressing the heterogeneity of connections presented in social media. However, the networks in social media are normally of colossal size, involving hundreds of thousands of actors. The scale of these networks entails scalable learning of models for collective behavior prediction. To address the scalability issue, we propose an edge-centric clustering scheme to extract sparse social dimensions. With sparse social dimensions, the proposed approach can efficiently handle networks of millions of actors while demonstrating a comparable prediction performance to other non-scalable methods.

Ranking Spatial Data by Quality Preferences

A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood. For example, using a real estate agency database of flats for lease, a customer may want to rank the flats with respect to the appropriateness of their location, defined after aggregating the qualities of other features (e.g.,restaurants, cafes, hospital, market, etc.) within their spatial neighborhood. Such neighborhood concept can be specified by the user via different functions. It can bean explicit circular region within a given distance from the flat. Another intuitive definition is to assign higher weights to the features based on their proximity to the flat. In this paper, we formally define spatial preference queries and propose appropriate indexing techniques and search algorithms for them. Extensive evaluation of our methods on both real and synthetic data reveals that an optimized branch-and-bound solution is efficient and robust with respect to different parameters.

Remote Wireless Sensor Networks for Water Quality Monitoring Requirements

Monitoring and measuring Water quality of  rivers, lakes, seas and oceans has been a critical question around the whole world. Traditionally, satellites are widely used for remote water sensing. Satellites can only give a larger view on water quality. They can't pin point a particular region, where we want to conduct a quality measurement. Due to the recent advancements in the fields of communication and sensing technology like Cyber Physical System (CPS) and wireless sensor network, efforts are on to build a wireless sensors deployed underwater for water quality surveillance. Sensors which are specifically developed for underwater environment, was able to collect critical water quality measurements like chemical substances,temperature etc. These sensors have advanced features like transmitting data through acoustic waves.

ZigBee is a specification for high level communication protocols which are based on the IEEE 802.15.4-2003 standard for Low Rate Wireless Personal Area Networks. These  protocols use small, low power digital radios. Node distribution is optimized to reduce energy consumption and to ensure effective information acquisition in wireless sensor network. LR-WPANs are widely used for remote detection and real-time monitoring of natural water.

Web Image Searching Engine Using SIFT Algorithm

 This article provides an insight into web content based image search engine using Scale Invariant Feature Transform (SIFT) feature matching. SIFT descriptors are invariant to image scaling and transformation and rotation, and partially invariant to illumination changes and affine which present the local features of an image.There for, SIFT can extract feature key points more accurately than texture, color, shape and spatial relations feature. To decrease unavailable features matching, a dynamic probability function replaces the original fixed value to determine the similarity distance and database from training images.

For the establishment of source image library, the spider technology used to extract images in Web pages. Then, by using pretreatment of the source images, the key points will be stored to the XML format, which can improve the searching performance. By using of the Hibernate framework and related technology, all of the information of image can establish a link with the database, and completed the development of persistent object. Finally, the results displayed to the user through the HTML. The experimental results show that this method improves the stability and precision of image searching engine.

Internet working between OSI and TCP/IP Network Managements with Security Features Requirements

Powerful and flexible paradigms has been used to integrate OSI network and the TCP/IP internet the application gateway. Drawbacks in micro managements of the gateway causes high commission costs and long delays while responding to critical scenarios. There should be a well defined mechanism to map the access control policy between two domains which are using different security policy. This scenario arise due to the use of different standards across each domain. Aim of this project is to to reduce network management costs and delays by proposing an application gateway that delegates powerful and complex services of the CMIP as well as management functions sent to an agent by a manger. Another objective of this project is to to guarantee the safe communication between two domains by security mechanism converting the security policy in order.

Android Gesture Recognition

Android is a Linux-based operating system for mobile devices such as smartphones and tablet computers. It is developed by the Open Handset Alliance led by Google. Google purchased the initial developer of the software, Android Inc., in 2005.The unveiling of the Android distribution in 2007 was announced with the founding of the Open Handset Alliance, a consortium of 86 hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. Google releases the Android code as open-source, under the Apache License. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android .Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. Developers write primarily in a customized version of Java. Apps can be downloaded from third-party sites or through online stores such as Google Play (formerly Android Market), the app store run by Google.

Software Watermarking Project

 Software security is constantly compromised by attack from hackers. Typically, hackers spend time and resources to tamper with the code to discover vulnerabilities then exploit these to carry out an attack. Such attacks, when conducted in a distributed corporations, online service providers, government agencies, etc. One possible defense against hackers is to have multiple copies of software which are functionally equivalent but where each copy is distinct (Software Diversity).In this case, an attack is likely to be effective against only one instance (or a small fraction of instances) of the software. Some tools and techniques have been devised for this purpose. Moreover, these tools modify software at the source code level. We believe that  transformations at the assembly code level are more robust and secure. Watermarking is a technique of embedding some special mark in an object to use it as identification. This project addresses software watermarking, i.e., embedding some special pieces of code in software so as to uniquely identify software. These special pieces of code (transformations) serve as a watermark and can carry any special information we wish to embed.

Solving 0-1 Knapsack Problem using Genetic Algorithm

The main goal of this project is to find a solution of 0-1 knapsack problem using  genetic algorithms. The 0-1 knapsack problem is a combinatorial optimization problem which seeks to maximize the benefit of objects in a knapsack without exceeding its capacity. Due to the nature of the problem it is not possible to use exact methods for large instances. Genetic algorithms provide efficient , effective techniques for optimization applications. In this project we use Genetic Algorithms to solve the 0-1 Knapsack problem where one has to maximize the benefit of objects in a knapsack without exceeding its capacity. Since the Knapsack problem is an NP problem, approaches such as dynamic programming, backtracking, branch and bound, etc. are not very useful for solving it. Genetic Algorithms definitely rule them all and prove to be the best approach in obtaining solutions to problems traditionally thought of as computationally in feasible such as the knapsack problem. 

Paint Program in C

Paint program in C is just similar to MS paint. It allows drawing pictures and saving them. The structure of C paint is divided into menu bar, tool bar, color tool bar, status bar and draw pad to draw pictures. C graphics provides 16 number of colors, so that only 16 colors are available to use. A few no. of tool bars (rectangle tool bar, line tool, circle tool  etc) are provided by C paint. Status bar displays help messages while using C paint. Draw pad facilitates the user to draw the pictures inside draw pad window. The algorithms, coding and implementation of C paint we discussed further. The execution of the programs may work a bit slowly.The coding is done in such a way that it can be improved and implemented with more applications in an easy way.

Popular Videos

How to speak to people

How to speak so that people want to listen.

Got a tip or Question?
Let us know