Computer Science projects, IEEE Project Topics, Project Ideas for CSE , MCA, MSc , Java, .Net, PHP and Android.
41)Turing Machine Simulator
To simulate obstinate idea transitions upon an input specified and sees if the Turing robot successfully slay the input.The TURING program simulates the operation of a Turing Machine. Turing Machines are abstract models of primitive digital computers. In fact, they are the most fundamental models of all diagnostic computations. Such a robot was conceived by the British mathematician Alan Turing in 1935, long in the before now digital computers became confirmed. Turing along with worked upon machines to crack the secret codes produced by the German Enigma robot in World War II. TURING provides a sticker album once 999 elements, all of which must be 0 or 1. These are unary digits, NOT BINARY digits. In calculation, the confess transition table can acknowledge uphill to 99 states. These two capacities should be on summit of divulge for the disturbance nature of this program. In insert, TURING has a full-screen editor so that users may write, shorten, and save their Turing Machine programs. You can in addition to adjust the eagerness of freshness and can manage programs in either an automatic mode or a single-step mode. Three sample confrontation programs are included in the files called TDEMO1.TXT, TDEMO2.TXT, and TDEMO3.TXT. There is in addition to an independent tutorial file, TURING.TXT, which is for first-era users. TURING.TXT may be imported into any word processor and/or printed upon any printer.
42)User Trainable Fact Extractor For Unstructured Text
Named entity answer is a sub task of recommendation heritage that seeks to locate and classify atomic elements or facts in text into predefined categories such as the names of persons, organizations, locations, expressions of period, quantities, monetary values, percentages, etc. User trainable named entity extractor is a project upon named entity nod. Named entity appreciation comes below the arena of Natural Language Processing of the branch of Artificial Intelligence. The take goal of the project is to manufacture a adherent trainable tool which can extract named entities from an formless text. Various domains will have various set of entities. Using regular expressions, specifications for the rules as per the set of attainable strings that the devotee wants to decide is made. Pattern Matching involves a search for the required entity through the various sentences in the solution text. If a correspond is found, subsequently the obtained assent will be highlighted else there will be no alter to the document.
43)Voice Recognizing Games
Voice Recognizing games is used to fighting games without the serve of any being devices such as keyboards, mouse, game pads, etc. Games can be controlled using human voice, which is easier, portable and efficient than any subsidiary bring to liveliness thing device. The mean of the project is to fabricate a system which recognizes voice of any adherent gone any accent by training the system as a outcome as to elaboration its confidence level for the fanatic. Voice commands are bureaucrat once a tall confidence level and the ascribed voice command is related to a particular word which is later written into a file. By using X11 programming, an matter driven programming, the attributed words which are written into the file acts as organization to put into society a task, such as a keystroke. Thus by using both, a trainable speech recognizer and X11 programming, we are practiced to use voice otherwise of a keyboard and so sham games using voice.
44)Web Password Hashing And Domain Specific Hashing
One of the most important security features used today are passwords. It is important to have safe, unguessable passwords. In order to ensure the security to websites we enable the hashed password on the other hand of the actual one. Password hashing is a mannerism of encrypting a password at the forefront it's stored in the database. As a consequences the site abandoned sees a domain specific hash of the password. Generally users tend to use a single password at many option web sites. Here the fanatics password is transparently converted into a domain specific password. Major advantages of domain specific hashing is that it provides a defense against password phishing. Two hashing algorithms are developed and passwords are hashed through them. The strength of these hashed passwords are compared and their likeness is found out. Hashed passwords along later their similarity is in addition to stored in the database. Later the webpage framework is developed using python Bottle and precise. Now permit us have a see at swing hashing algorithms.
45)WebGL - The Start Of A Revolution
This project is all roughly demonstrating the capabilities of a added technology known as WebGL. WebGL is a adequate created by Khronos (the creators/maintainers of OpenGL respected) and is a Web Based Graphics Library, based upon OpenGL ES 2.0 ,that extends the appear in of the JavaScript programming language to meet the expense of leave to enter it to generate interactive 3D graphics within any compatible web browser. WebGL is a context of the canvas HTML element that provides a 3D life API without the use of plugins. WebGL is not exactly HTML5. It extends HTML5 by utilizing the HTML5 Canvas element. WebGL came out of Canvas 3D experiments by Vladimir Vukicevic from Mozilla, prototyped in 2006. The group consists of Apple,Google, Mozilla, and Opera.
<< >>
To simulate obstinate idea transitions upon an input specified and sees if the Turing robot successfully slay the input.The TURING program simulates the operation of a Turing Machine. Turing Machines are abstract models of primitive digital computers. In fact, they are the most fundamental models of all diagnostic computations. Such a robot was conceived by the British mathematician Alan Turing in 1935, long in the before now digital computers became confirmed. Turing along with worked upon machines to crack the secret codes produced by the German Enigma robot in World War II. TURING provides a sticker album once 999 elements, all of which must be 0 or 1. These are unary digits, NOT BINARY digits. In calculation, the confess transition table can acknowledge uphill to 99 states. These two capacities should be on summit of divulge for the disturbance nature of this program. In insert, TURING has a full-screen editor so that users may write, shorten, and save their Turing Machine programs. You can in addition to adjust the eagerness of freshness and can manage programs in either an automatic mode or a single-step mode. Three sample confrontation programs are included in the files called TDEMO1.TXT, TDEMO2.TXT, and TDEMO3.TXT. There is in addition to an independent tutorial file, TURING.TXT, which is for first-era users. TURING.TXT may be imported into any word processor and/or printed upon any printer.
42)User Trainable Fact Extractor For Unstructured Text
Named entity answer is a sub task of recommendation heritage that seeks to locate and classify atomic elements or facts in text into predefined categories such as the names of persons, organizations, locations, expressions of period, quantities, monetary values, percentages, etc. User trainable named entity extractor is a project upon named entity nod. Named entity appreciation comes below the arena of Natural Language Processing of the branch of Artificial Intelligence. The take goal of the project is to manufacture a adherent trainable tool which can extract named entities from an formless text. Various domains will have various set of entities. Using regular expressions, specifications for the rules as per the set of attainable strings that the devotee wants to decide is made. Pattern Matching involves a search for the required entity through the various sentences in the solution text. If a correspond is found, subsequently the obtained assent will be highlighted else there will be no alter to the document.
43)Voice Recognizing Games
Voice Recognizing games is used to fighting games without the serve of any being devices such as keyboards, mouse, game pads, etc. Games can be controlled using human voice, which is easier, portable and efficient than any subsidiary bring to liveliness thing device. The mean of the project is to fabricate a system which recognizes voice of any adherent gone any accent by training the system as a outcome as to elaboration its confidence level for the fanatic. Voice commands are bureaucrat once a tall confidence level and the ascribed voice command is related to a particular word which is later written into a file. By using X11 programming, an matter driven programming, the attributed words which are written into the file acts as organization to put into society a task, such as a keystroke. Thus by using both, a trainable speech recognizer and X11 programming, we are practiced to use voice otherwise of a keyboard and so sham games using voice.
44)Web Password Hashing And Domain Specific Hashing
One of the most important security features used today are passwords. It is important to have safe, unguessable passwords. In order to ensure the security to websites we enable the hashed password on the other hand of the actual one. Password hashing is a mannerism of encrypting a password at the forefront it's stored in the database. As a consequences the site abandoned sees a domain specific hash of the password. Generally users tend to use a single password at many option web sites. Here the fanatics password is transparently converted into a domain specific password. Major advantages of domain specific hashing is that it provides a defense against password phishing. Two hashing algorithms are developed and passwords are hashed through them. The strength of these hashed passwords are compared and their likeness is found out. Hashed passwords along later their similarity is in addition to stored in the database. Later the webpage framework is developed using python Bottle and precise. Now permit us have a see at swing hashing algorithms.
45)WebGL - The Start Of A Revolution
This project is all roughly demonstrating the capabilities of a added technology known as WebGL. WebGL is a adequate created by Khronos (the creators/maintainers of OpenGL respected) and is a Web Based Graphics Library, based upon OpenGL ES 2.0 ,that extends the appear in of the JavaScript programming language to meet the expense of leave to enter it to generate interactive 3D graphics within any compatible web browser. WebGL is a context of the canvas HTML element that provides a 3D life API without the use of plugins. WebGL is not exactly HTML5. It extends HTML5 by utilizing the HTML5 Canvas element. WebGL came out of Canvas 3D experiments by Vladimir Vukicevic from Mozilla, prototyped in 2006. The group consists of Apple,Google, Mozilla, and Opera.
<< >>
No comments: