Sie sind auf Seite 1von 2

Appendix B: Examples of Project titles

Appendix B: Examples of Project titles

These are titles of Projects that have been done in the past; some titles have been amended to improve clarity. Their inclusion is to give all concerned an idea of style rather than to indicate appropriate subject matter. There is no attempt to indicate the full variety of themes. Notice the style of the titles. The first part often gives a general context; the second establishes the work done within a limited area. Projects often need to address current problems. Check out the computer press both locally and internationally to see what these may be. 1. 2. A database design for stock control at a defence company: relating new functional requirements, existing file stores into a new conceptual design. Defining the limits of executive information systems at a computer company: evaluating the experience of a sample of actual and reneging users to the prior assessed benefits. Designing a security mechanism for object oriented database: relating multi-level security strategies to alternative security models. Practical evaluation of UNIX security: the vulnerability of the University system to password capture and decryption. Problems of implementing web access to an operational database: a study of critical failure points in providing full transactional access. Office automation security at a petroleum company: how to implement critical services in an environment of available technology. Relating financial policy and management reporting at a computer company: solving IT problems of accounting periods by improving management understanding of their own information requirements. Survey of the use of optical storage in customer service departments at a major bank: the real benefits of massive on-line storage associating organisational change and competitiveness. C.A.S.E. Tool integration practice: where C.A.S.E. tools hinder rapid development and what can be done about it. Software risk management practice: a survey of the techniques used by five successful developers. Survey of formal methods usage in the financial sector: an application of a formal method to a case study demonstrating proof of correctness at each refinement step. Algorithms for random number generation and their experimental evaluation: specifying requirements for pseudo-random numbers and evaluating the outcomes of implementation. A demonstration of techniques for the visual display of graph manipulation routines: an evaluation of the effectiveness of the selected graphical display techniques. An empirical evaluation of software complexity measures: can similar metrics be used with different source languages? Approaching the limits of data compression: the trade-off between performance and degree of compression. Intelligent assistance for decryption: the development of interactive software tools to aid the decryption process.

3. 4. 5. 6. 7.


9. 10. 11.



14. 15. 16.


320 Project

17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30.

A computer-aided learning system using hypertext: implementing hypertext to achieve claimed benefits. The animation of selected sort algorithms: designing interactive visual processes to aid learning. The use of functional programming languages: how database technology can be used. An investigation into computer vision: how high and low level vision can be integrated. The graphical representation of robot blocks world: a demonstrator using MacProlog and a theorem prover to implement plans of arbitrary complexity. An investigation of the use of search in artificial intelligence: criteria for developing search strategies demonstrated in LISP. Are workstations safe: the relation of actual workstations to ergonomic standards? Maintaining data quality in a data warehouse: the analysis of user problems in the management of data-feeds. Defining service levels for electronic commerce: how to avoid offering a service that cannot be achieved. The role of the webmaster: accuracy, integrity, and flexibility and how they relate to consumer behaviour. Quality assurance in rapid development: evaluating the structures and measuring resources required. Managing security in a large SQL database: an analysis of security incidents over a six month period. Data mining: how users learn to ask the right questions. Multimedia courseware development: a study into the deficiencies of conventional courseware development methodologies.

At the time of writing (2009) there have not yet been any projects submitted in Creative Computing or Computing with Law. Thus the following is provided to indicate some part of the scope for what is appropriate. Creative Computing 1. Programming language support for visual creativity: a comparison of Processing with standard Java in terms of simulating three-dimensional artefacts. 2. 3. 4. 5. Algorithms and creativity in music: AI issues in implementing and testing criteria for aesthetic judgments on computer-generated sound works. Digital technology: modelling partner work in animation. Digital technology and creativity: the use of collaborative design. Dance and technology: the use of Processing as a choreographers aid.

Computing with Law 1. Legal case study storage and retrieval: increasing efficiency of search and recovery. 2. 3. Legal case databases: Enhancement of intelligent query facilities. On-line support in the courtroom: enhancing security and privacy.