Science Models
Science Fair Projects

Published on Sep 19, 2023

Software Projects Ideas Final Year Engineering

Intranet Chatting
Intranet Mailing System
Intrusion Detection System
IRC Chat Client
Some Reasons a Computer Slow Down
Study and Analysis of Q-Learning Algorithm Parameters
Super-Encryption Standard for Large Data Using Elementary Chaotic Cellular Automata
Total Kid Organizer
Transportation Networks and the Propagation of Novel H1N1 Swine Flu-like Epidemics
Turbo Charging Computer with Mathematical Algorithms
Unbeatable PONG through Artificial Intelligence
Utilizing Artificial Neural Networks to Create a Learning Robot
VAS for Hand Held Device
Virtual Router Using Destination-Sequenced Distance Vector
Voyage Management
Web Blossom Bazzar
Web Enabled Automated Manufacturing System
Wireless Health Care System
Accuracy of Voice Recognition Software
Adaptive Interference Rejection in Wireless Networking
Air Force Security Using Thumb Checker
A Novel Approach to Text Compression Using N-Grams
Application of Bayesian Networks for Speech Classification
Application of Geographic Profiling to Graffiti Crimes
Artificial Intelligence Project in Computer-Based Music Composition
Category Oriented Web Search Engine Based on Round Robin Learning and Ranking Algorithm
Cell Breathing Technique
Computer Modeling of Altruistic Punishment and the Fitness of Cooperative Behavior
Computer Model of the SARS Epidemic
Computer Simulation and Study of the Strategy Board Game Blokus
Continual Adaptation of Acoustic Models for Domain-Specific Speech Recognition
Cracking the Code
Creating a 3D Rubik's Cube Simulator in C++ and OpenGL
Developing a Computer Program That Effectively Mimics Human Creativity
Development of a 3D Search Engine for Mechanical and Geometrical Applications
Development of a Mashup That Transforms a Smartphone into an Assisted Vision Aid
Drive 2 Destiny
Effect of Encryption Key Combination on Data Security
Effect of Impaired Judgment and Speed on Traffic Accidents
Effects of Cell Compressibility, Motility, and Contact Inhibition on the Growth of Tumor Cell Clusters
Effects of Motility and Contact Inhibition on Tumor Viability
Efficient Location Training Protocols For Heterogeneous Sensor And Actor Networks
E-Gift Shoppe
Electronic Cash Controller
Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing
Energy Maps for Mobile Wireless Networks
Enterprise Fleet Management System
Enterprise Security Services
Environmental Changes and Species Diversity
Evolving Neural Networks to Play Mastermind
Examining File Compression in Computers
Face Recognition by the Computer
Fault-Tolerant Token Based Atomic Broadcast Algorithm
File Security System
Friend Mapper on Mobiles
Global Tracker
Health Maintenance System
Image Compression and De-compression
Image Processing Editor
Improving Utilization Of Infrastructure Clouds
Innovating Credit Card Security through Smartphone
Inter Bank Fund Transfer in Distributed Network
Issue Tracker
IT Project and Process Management
Jobbing Portcullis
Lending Tree
Load Shedding In Mobile Systems With Mobiqual
Local Layering of Images with a Natural User Interface
MACA Multiple Access with Collision Avoidance
Malware Identification by Statistical Opcode Analysis
Mathematical Model for the Optimal Arrangement of Cell Phone Towers
Medical Image Compression
Mindtech Bug And Component Systems
Mobi Travel Guide
Mobile Advertisement System
Mobile Banking System
Mobile Electronic Program Guide
Mobile i Broker
Mobile Location Alarm
Mobile Phone Tracking
Movie World
Multi-document Summarization using Spectral Clustering
Net the Net
Novel Genetics-Based Early Disease Detection Using Ontology-Driven Microarray Semantics
Online Fast Food
Plagiarism Analysis Program
Post-Disaster Response Using a Novel Adaptive Object Recognition Algorithm
Prisoner's Dilemma
Programming a Video Game in Scheme
Programming for the Computer and iPhone Platforms
Quadrocopter Aerial Monocular Vision for Improved Autonomous Robot Navigation
Real-Time Markerless Hand Computer Interaction
Salmonids by Numbers II
Security Through Chaos
Simulating Incompressible Fluid Flow with the Navier-Stokes Equation