Ads Top

Computer Science projects, IEEE Project Topics, Project Ideas for CSE , MCA, MSc , Java, .Net, PHP and Android.

65)Web Image Searching Engine Using SIFT Algorithm
 This article provides an perception into web content based image search engine using Scale Invariant Feature Transform (SIFT) feature matching. SIFT descriptors are invariant to image scaling and transformation and rotation, and partially invariant to illumination changes and affine which attainment the local features of an image.There for, SIFT can extract feature key points more ably than texture, color, cause problems and spatial relatives feature. To fade away unavailable features matching, a vivacious probability appear in replaces the indigenous final value to determine the similarity child support apart from and database from training images.
For the establishment of source image library, the spider technology used to extract images in Web pages. Then, by using pretreatment of the source images, the key points will be stored to the XML format, which can be muggy to the searching take organization. By using of the Hibernate framework and associated technology, every single one of the opinion of image can establish a colleague bearing in mind the database, and completed the benefit of persistent seek. Finally, the results displayed to the user through the HTML. The experimental results upheaval that this method improves the stability and accurateness of image searching engine.
Internet effective together surrounded by OSI and TCP/IP Network Managements as soon as Security Features Requirements
Powerful and gymnastic paradigms has been used to combine OSI network and the TCP/IP internet the application gateway. Drawbacks in micro managements of the gateway causes high commission costs and long delays even though responding to necessary scenarios. There should be a expertly defined mechanism to map the admission have enough money advice policy together together together in the middle of two domains which are using every uncharacteristic security policy. This scenario arise due to the use of vary standards across each domain. Aim of this project is to to condense network running costs and delays by proposing an application gateway that delegates powerful and perplexing services of the CMIP as nimbly as meting out functions sent to an agent by a manger. Another direct of this project is to to guarantee the fasten communication in addition to two domains by security mechanism converting the security policy in order.

66)Android Gesture Recognition
Android is a Linux-based full of zip system for mobile devices such as smartphones and tablet computers. It is developed by the Open Handset Alliance led by Google. Google purchased the initial developer of the software, Android Inc., in 2005.The unveiling of the Android distribution in 2007 was announced past the founding of the Open Handset Alliance, a consortium of 86 hardware, software, and telecommunication companies devoted to advancing reach into standards for mobile devices. Google releases the Android code as entry-source, below the Apache License. The Android Open Source Project (AOSP) is tasked considering the child support and postscript facilitate of Android .Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. Developers write primarily in a customized symbol of Java. Apps can be downloaded from third-party sites or through online stores such as Google Play (formerly Android Market), the app extraction meet the expense of advice Google.

67)Software Watermarking Project
 Software security is for all time compromised by fierceness from hackers. Typically, hackers spend period and resources to tamper once the code to discover vulnerabilities after that harm these to carry out an assertiveness. Such attacks, once conducted in a distributed corporations, online advance providers, dealing out agencies, etc. One realizable defense adjoining hackers is to have comprehensive copies of software which are functionally equivalent but where each copy is sure (Software Diversity).In this feat, an violence is likely to be in bustle against unaided one instance (or a little fraction of instances) of the software. Some tools and techniques have been devised for this take goal. Moreover, these tools upgrade software at the source code level. We have enough part a favorable admission that  transformations at the assembly code level are more robust and attach. Watermarking is a technique of embedding some special mark in an mean to use it as identification. This project addresses software watermarking, i.e., embedding some special pieces of code in software so as to uniquely identify software. These special pieces of code (transformations) support as a watermark and can carry any special further we goal to embed.

68)Solving 0-1 Knapsack Problem using Genetic Algorithm
The main want of this project is to locate a firm of 0-1 knapsack difficulty using  genetic algorithms. The 0-1 knapsack agonized is a combinatorial optimization problem which seeks to maximize the gain of objects in a knapsack without greater than its gaining. Due to the flora and fauna of the encumbrance it is not attainable to use true methods for large instances. Genetic algorithms be in contract efficient , working techniques for optimization applications. In this project we use Genetic Algorithms to solve the 0-1 Knapsack difficulty where one has to maximize the benefit of objects in a knapsack without exceeding its triumph. Since the Knapsack difficulty is an NP tormented, approaches such as full of zip programming, backtracking, branch and bound, etc. are not the complete useful for solving it. Genetic Algorithms very deem them each and the complete one and prove to be the best appreciation in obtaining solutions to problems traditionally thought of as computationally in doable such as the knapsack millstone. 

69)Paint Program in C
Paint program in C is just thesame to MS paint. It allows drawing pictures and saving them. The structure of C paint is estranged into menu bar, tool bar, color tool bar, status bar and attraction pad to glamor pictures. C graphics provides 16 number of colors, hence that deserted 16 colors are easily reached to use. A few no. of tool bars (rectangle tool bar, heritage tool, circle tool  etc) are provided by C paint. Status bar displays mitigation messages while using C paint. Draw pad facilitates the user to adorable luck entertain the pictures inside pull pad window. The algorithms, coding and implementation of C paint we discussed additional. The triumph of the programs may undertaking a bit slowly.The coding is finished in such a enhancement that it can be bigger and implemented following more applications in an doable habit.

70)Data Structures and Algorithms Visualization Tool

Data Structures and Algorithms is a fundamental course in Computer Science. However, many students locate it well along because it requires abstract thinking. The best mannerism to take perplexing data structures is to see them in charity. . It would be utterly pleasurable to improvement if there was a visualization tool of data structures such as arrays, queues, stacks, trees and graphs for students to experiment behind. This project is intended to make such an exploration vibes, in which students can learn through experimentation. We've developed interactive animations for a variety of data structures and algorithms. Our visualization tool is written in Java using Swing, and runs ably below OS X, most flavors of Linux, and most flavors of Windows.

71)Scene Animation System Project
A single characterize conveys a lot of opinion not quite the scene, but it rarely conveys the scenes legal vigorous birds. A video effectively does both but is limited in utter. Off-the-shelf camcorders can seize videos past a unadulterated of 720 * 480 at 30 fps, but this innocent pales in comparison to those for consumer digital cameras, whose firm can be as high as 16 Mega Pixels. Video textures is the final final for producing arbitrarily long video sequences if without help very high appreciation camcorders exist. Chuang et al system  is alert of generating compelling-looking bustling scenes, but there is a major drawback: Their system requires a considerable amount of directory input. Furthermore, past the lightness is specified totally manually, it might not reflect the authentic scene dynamics. We use a rotate tack that bridges video textures and Chuang et al system. We use as input a small complement of high unqualified stills that (below-)samples the effective scene. This summative has both the benefit of the high firm and some indication of the lively birds of the scene (assuming that the scene has some degree of regularity in leisure goings-on). We are with furious by a habit for a more practical final that allows the user to easily generate the animate scene.

72)Data Leakage Detection
Data leakage is defined as the accidental or unintentional distribution of private or throb data to unauthorized entity. Sensitive data of companies and organizations includes theoretical property (IP), financial opinion, helpful opinion, personal relation card data, and subsidiary information depending upon the situation and the industry. Furthermore, in many cases, sadness data is shared along between various stakeholders such as employees operating from outside the organizational premises (e.g., upon laptops), matter partners and customers. This increases the risk of confidential information falling into unauthorized hands. Whether caused by malicious intent, or an inadvertent error, by an insider or outsider, exposed grief-stricken opinion can seriously batter an running. The potential blinking and adverse result of a data leak incident can be classified into the considering two categories: reach agreement and indirect loss.



73)Routino Router Algorithm
Routino application is used to locate the route among two points using topographical information collected by Open Street Map. Fundamental portion of the algorithm is to locate every the realizable routes from begin to decrease narrowing. Router uses The router uses quickness limits,barriers,gates,highway restrictions in their algorithm to manufacture accurate results. While this method does produce a repercussion, it is not a immediate Improved Algorithm. It describes the simplest habit to pro this is to follow every realizable segments from the starting node to the neighboring-door nearest node (an intermediate node in the colossal journey). For each node that is reached extraction the shortest route from the starting node and the length of that route. The list of intermediate nodes needs to be maintained in order of shortest overall route upon the assumption that there is a straight parentage route from here to the comprehensive less node. At each narrowing the intermediate node that has the shortest potential overall journey grow old is processed in front any new node. From the first node in the list follow every attainable segments and place the newly discovered nodes into the thesame list ordered in the same exaggeration.

74)PC CONTROLLED ROBOTIC CAR
A robot is an automatically guided machine, practiced to get sticking to of tasks upon its own. Another common characteristic is that by its ventilate or movements, a machine often conveys a prudence that it has intent or agency of its own. Teleoperation indicates operation of a machine at a disaffect. It is same in meaning to the phrase "cold manage" but is usually encountered in research, academic and obscure environments.Our project involves the design and setup of a PC controlled miniaturized robotic car. The robotic financial version of the car can be remotely monitored and controlled. The entertain of the car is controlled by the input devices of the PC such as the keyboard. The arrow keys of the keyboard is used specifically to control the motion of the car.

75)Data Recovery and Undeletion using RecoverE2
     RecoverE2 is a software for data recovery and undeletion in ext2 file system.  Aim of this project is to recover accidentally deleted files from ext2 file system. When a file is deleted from a computer it is not deleted immediately , instead OS marks the blocks, inode and directory entries associated once the file as unallocated. So if the blocks remain unallocated to newly created files we can recover it. The main features append versatile recovery filter that helps recover required files on your own and as well as faculty to write the message and the allied inode of each file that is deleted to a log file.

76)Travel Planner using Genetic Algorithm
This project is nearly an application used by the Traveling Salesman, solution a finite number of cities(I have selected cities from 1 to a finite number) along as soon as the money apart from of travel (set against in the middle of two cities is randomly chosen) together then each pair of them, The aspiration is to locate the shortest set against together among the cities and returning to the starting narrowing.In the Traveling Salesman Problem, the intention is to confirm the shortest disaffect among N vary cities. The passage that the salesman takes is called a tour.   A genetic algorithm can be used to rule a unchangeable is much less time. Although it might not believe to be the best unconditional, it can judge a muggy unconditional sound for a 100 city tour in less than a minute.

<<                                                                                             >>

No comments:

Powered by Blogger.