Project Ideas for Students

Low Delay Single Symbol Error Correction Codes Based on Reed Solomon Codes

Low Delay Single Symbol Error Correction Codes Based on Reed Solomon Codes

Error Correction Codes (ECCs) recommends a delayed penalty in pervading the data as encoding or decoding has to be executed. ECCs are extensively used to conserve memory and to bypass data corruption. Due to hindering the use of ECCs in high-speed memories, it led to the use of Single Error Correction Double Error Detection (SECDED) codes. 

Multiple Cell Upsets (MCUs) becomes more familiar and restrict the use of SEC-DED codes unless they are joined with interleaving as technology scaled up. The biggest issue in memories is arising the errors which can be explained i.e. by radiation-induced soft errors that alter one or more memory cells, shift their values and other deficiencies cause permanent damage. 

Read more..

Controlling a Robot hand in MATLAB simulation and reality

Controlling a Robot hand in MATLAB simulation and reality

Overview

This MATLAB project is about creating a mechanical arm which actuates according to the directions given it. The project can be made in different ways and we will see the simplest way of creating it. We will make the project possible with the help of MATLAB/Simulink. The use of MATLAB is very extensive in the field of IT and Robotics. The design and material should be used carefully picked for the project.

Read more..

How to use Bluetooth with MATLAB for wireless communication

How to use Bluetooth with MATLAB for wireless communication

Overview

Bluetooth is a wireless communication device used to transfer data from one device to another. It is the simplest way to transfer data using port addresses of the devices. Nowadays, Bluetooth is installed in every device and anyone uses it simply. Bluetooth with MATLAB is the new way of communicating efficiently between devices. We will use MATLAB on one side and Arduino on the other side.

In this MATLAB project, we will establish a secure connection between the different devices using these two tactics. Well, there are many ways to make the connection but we will see the simplest one.  

Read more..

Who is a good dog (Data Analysis project)

Who is a good dog (Data Analysis project)

Introduction

We've prepared AI frameworks to distinguish objects, explore roads and perceive outward appearances, yet as troublesome as they might be. They don't contact the degree of refinement required to reenact, for instance, a dog. Indeed, this undertaking intends to do only that — in a restricted manner. By watching the conduct of A Very Good Girl, this AI took in the basics of the proper behaviour like a dog. 

Read more..

Sports predictor using Machine Learning

Sports predictor using Machine Learning

AI (ML) is one of the clever techniques that have demonstrated promising outcomes in the spaces of order and forecast. One of the growing territories requiring great prescient precision is sports expectation. Because of the enormous money related sums engaged with wagering. What's more, club supervisors and proprietors are making progress toward characterization models. With the goal that they can comprehend and figure techniques expected to win matches. These models depend on various variables associated with the games. The aftereffects of chronicled matches, player execution pointers, and restriction data

Read more..

Battery optimiser Android project

Battery optimiser Android project

In the developing universe of innovation, cell phones have immediately risen as one of the quickest advancing fields. They have expanded in both prevalence and unpredictability. Requiring further developed working systems and applications to fulfil the needs of the buyer. Android is a software stack intended to fulfil these needs in an open-source environment. The task is at present created and financed by the Open Handset Alliance, which incorporates organizations, for example, Google and T-Mobile

Read more..

Handwritten document recognition system using machine learning

Handwritten document recognition system using machine learning

Introduction

Neural networks are utilized as a strategy for deep learning, one of the many subfields of artificial knowledge. They have first proposed around 70 years back as a try at reproducing the manner in which the human brain works, yet in a more streamlined structure. Singular 'neurons' are connected in layers, with weights allocated to decide how the neuron reacts when signals are spread through the network.

Read more..

Fahrenheit to Celcius conversion application using JAVA

Fahrenheit to Celcius conversion application using JAVA

JAVA is one of the famous programming languages of all time and also it is the most effective programming language. Following are some of the advantages of JAVA: simple and user-friendly, object-oriented, and it can run on any machine without any special software.

In this JAVA project, we will develop an application to convert Fahrenheit into Celcius with the help of JAVA programming.

Read more..

Learn How to Crack a Password With Python Programming

Password cracker using Python Ethical hacking project

In recent years ethical hacking has gained huge popularity because of its wide applications. It is used by many organizations to prevent their site from hackers. Before discussing ethical hacking first you need to understand what is hacking.

Hacking is the process of performing malicious activities in a device by gaining unauthorized access using the vulnerabilities found in the system. The malicious activities such as deleting a system file or stealing sensitive information. Mostly hacking is performed illegally without taking permission from the user.

Now, will discuss what is ethical hacking. It is the process of finding the vulnerabilities in a system or device by performing various attacks to resolve those vulnerabilities. Ethical hacking is legal and it is performed after taking permission from the user.

In this ethical hacking project, we are going to use python to create a password cracker which uses a dictionary attack to crack passwords.

Passwords are always hashed before storing in the database and the hash is compared for verification purpose.

Read more..

Develop a Virtual Private Network (VPN) using Java

Virtual Private Network using JAVA

Virtual Private Network or VPN is used for various purposes to access the internet securely. VPN is legalised in most of the countries unless it is not used to access copyrighted material or to commit online fraud. In this JAVA project, we will learn to develop a VPN app in JAVA using Android Studio.

Let’s understand What is VPN?

VPN is abbreviated to Virtual Private Network. VPN creates a private network using a public network such as the internet to create a safe and encrypted connection. Here the user is part of the local network only, but with the help of tunnelling protocols, VPN creates a secure connection.

For example - Think of a situation where the corporate office of a bank is headquartered at Singapore, the computers in that office are connected to a local network. Another branch of the same bank is in Mumbai. Now if they want to connect both the network means, the usual method of creating a secure connection between the head office and branch office is by a leased line which is a costly method and not reliable.

Read more..
Subscribe for more project ideas



About Skyfi Labs
  • ✔ 2nd Best Business Venture Award, Ideas'12, IIT Kanpur
  • ✔ 30 Most Promising Startups, Next Big Idea'12, IIM Bangalore
  • ✔ Runner Up, UnLtd India Growth Challenge 2013
  • ✔ Limca Book of records for conducting largest Aeromodelling event in India
  • ✔ Experience of training students across 26 states in India and Dubai
  • ✔ Officially a part of IIT Delhi course and IIT Kanpur Orientation Program for freshers
  • ✔ Venture funded by The Chennai Angels & Spark Capital
  • ✔ A Venture by IIT Kanpur alumni