All Available Projects

Filters

Can't find a suitable project for you below?

Don't worry! You can still present your own project idea to a supervisor, have a look at the list of supervisors here!

Cover Image

OBD InsightBot: Conversational Vehicle Diagnostics

Create a chatbot that answers user questions about vehicle health using OBD-II data and IBM Granite

Cover Image

Race Replay AI: Simulated F1 Telemetry Narrator

Replay OBD-II-like data and generate real-time F1-style commentary using IBM Granite.

Cover Image

Programming the IBM Quantum Computer

Interact with the IBM Quantum Computer and programming it to solve a simple problem

Cover Image

Programming the IBM Quantum Computer

This project would involve you interacting with the IBM Quantum Computer and programming it to solve a simple problem.

Cover Image

Content Caching in Information-centric Networks

Design and evaluation of in-network caching strategy for information-centric networks

Cover Image

Information resilience for communication networks in disaster scenario

Assessing information resilience in communication networks with network perturbations such as link and/or node failures

Cover Image

Analysis of the Internet Topology

Applying complex network analysis to understand the evolution of the Internet topology

Cover Image

Spreading process in networks

Simulating spreading phenomena in networks

Cover Image

Data Privacy Incident Response Framework

Create a Data Privacy Incident Response Framework that practitioners can use to plan and guide how the organisation will deal with a data breach

Cover Image

Privacy Governance Framework

Create a privacy governance framework for a client (you will need a client for this)

Cover Image

Modelling of virus spreading in adaptive networks

Understanding the coevolution of virus spreading and network adaptation.

Project Area 1: Data security and privacy compliance monitoring and violation detection

Securing the privacy of organizational and consumer data, and complying with different cyber security requirements, is an ongoing challenge for those providing services at both a local and global scale. Compliance policies specify allowed system behaviour and are ubiquitous in today's IT systems, ranging from access-control and security policies to regulations of personally identifiable data processing.

Project Area 2: Cyber Threat Intelligence

It is estimated in media reports that the majority of companies have suffered at the hands of cyber intrusions; this supposition is most probably accurate, and the extent is far worse than published, with large scale exfiltration of intellectual property and trade/national secrets. It should be noted that many companies that were compromised had sophisticated IT security controls in place but malware still got through.

Project Area 3: Cyber security risk analysis and management strategies

Significant effort have been undertaken by both private and government organizations to raise their cyber security capability. However, the daily occurrence of new and advanced cyber-attacks and attack vectors has perpetuated the general lack of understanding of cyber security (especially by non-IT individuals) and has made the measurement as well as enhancement of an organisation's cyber security capability a moving target.

Cover Image

Granite Guardian: Predictive Maintenance Advisor

Build an AI-powered system that analyzes OBD-II data to predict potential engine or component failures and explains them in natural language.

Cover Image

Reimagine Skills Build as an AI driven RPG game

Create an RPG game world (that utilises AI) where Skills Build resources are linked in the game

Cover Image

IBM VR Learning application

VR Game for IBM SkillsBuild 'Getting Started' Series

Cover Image

IBM AI enhanced technical documentation

Augmented Reality and AI to create a more engaging documentation experience

Cover Image

Development of an Energy Usage Dashboard for BU

Create a platform that shows energy use across departments, centres, buildings, and/or other places across BU

Cover Image

Emoji Gesture-Based Keyboard Input (Test)

The number of emoji continues to rise. However, the input mode is still limited to textual search or swiping through panes of emoji.

An improved accessibility auditing tool

Accessibility on the web is still poor, there are many evaluation tools, yet they are cumbersome to use and their results can be difficult to interpret.

Speculative Crypto/NFT-based projects

Apply the concepts of Cryptocurrency's or NFTs to novel application areas

Accessibility Nudge Support for Content

Investigate ways of providing accessibility nudge support (https://dl.acm.org/doi/10.1145/3290605.3300733) during the production of content.

Use of IoT within Flexible Media

Could IoT be used or activated using media to improve engagement and audience experiences?

Intelligent diagnosis of Patients with Chronic Respiratory Diseases

It is of paramount importance to monitor patients phenotypic profiles over time in order to understand the evolution of chronic respiratory diseases Asthma, COPD, Pneumonia, COVID-19 and more. The deployment of AI intelligent methods for also detecting the stages at which a patient could be in their diagnosed disease is also useful for the delivery of the right drugs and more personalised care. The aim in this investigation is to perform the ranking of various classification methods for best performances in the detection of the diseases of interest and also the various sought stages .

Cover Image

Developing an app for measuring shoulder movement based on MediaPipe Pose

A technical solution for measuring shoulder motion

Cover Image

A feasibility study project for developing digital shoulder pain solutions

A feasibility student of potential technologies of shoulder pains

Cover Image

Technical: Performance optimization

The XMLUtil library provides XML Serialization for the Kotlin ecosystem. However, no performance optimization has been done on the library.

Cover Image

Quantum Algorithm Development

Experiment with and develop quantum algorithms on a quantum simulator.

Cover Image

Emotional trends in scientific papers

Do emotions exist in scientific research?

Cover Image

Mobile Ad Hoc Networks (MANETS) under different mobility models

Design, implement and analyse connectivity of Mobile Ad Hoc Network under different mobility models

Cover Image

Utilisation of Machine learning to predict clavicle (collar bone) fracture healing in adult patients

This project aims to apply machine learning in predicting the need for early surgical intervention for clavicle fracture.

Cover Image

Information diffusion in temporal networks

This project aims to study how information diffuse in a temporal network where the network connectivity changes over time.

Cover Image

Robustness of inter-dependent/multi-layer networks

Many real-world complex systems have dependency with each other. This project investigates the robustness of such systems.

System-of-system risk assessment of a CI/CD pipeline

Creating a risk model for incorporating Dev[Sec]Ops into software development, to form a single CI/CD pipeline for software creation

NIST SP 800-37 User Interfaces for non-security experts

This project should deliver a software prototype to help teams collect, analyse, and manage PREPARE step data obtained when applying NIST SP 800-37. To reduce the timeline for developing such a tool from months to weeks, the back-end of the tool could be based on the open-source Computer Aided Integration of Requirements and Information Security (CAIRIS) platform. Because of the assumptions made about those using CAIRIS, the existing CAIRIS user interface (UI) won’t be suitable. As such, the focus of the project will be designing, developing and evaluating a UI that delivery teams could use on a day-to-day basis.

System-Level Fuzz Testing

How feasible is guided fuzz testing to exercise vehicle-based software within a simulated environment.

Cover Image

The Impact of Personality Traits on Scrum Team Effectiveness

This study explores how personality traits affect Scrum team effectiveness in software development, using a quantitative approach to analyze these dynamics.

Simplifying Clinical Communication for Adolescent Epilepsy Patients Using AI

This project focuses on developing an AI tool that translates complex clinical letters into simplified versions understandable by patients aged 12 to 16. The system will aim to ensure that young epilepsy patients, who often struggle with medical jargon, can comprehend their diagnosis and treatment plans clearly, improving their understanding and adherence to treatment.

Cover Image

Understanding cascading failures in communication networks

This project aims to investigate the impact of cascading failures on networks considering load rebalancing after failures.

Cover Image

Modelling Global Readiness for AI Agents in Financial Services

This project explores how finance professionals perceive and adopt AI tools such as robo-advisors, fraud detection systems, and automated trading platforms. Students will work with survey data to analyse trust, risk, ethics, and behavioural adoption factors. Using advanced analytics and machine learning, the goal is to build predictive models that explain which factors drive readiness for AI adoption in the financial sector.

Chatbot for Maternal Health Education and Support

A mobile app or web platform with chatbot feature

Personalised Pregnancy Care Through Predictive Analytics

A mobile app or web platform with risk analysis feature

Development and Evaluation of a Mobile Health and Wellbeing App for UK Blue Light Services

This project focuses on designing, developing, and evaluating a mobile application to support the health and wellbeing of police, ambulance, and fire service personnel. The app includes features for shift management, daily journaling, fluid intake tracking, sleep, physical activity, and nutrition.

AI-Driven Process Flow Optimisation in CNC Manufacturing

Simulation, model development and prototyping

SME Framework for ensuring software meets EU Cyber Resilience Act (CRA) requirement (you will need a client for this project)

The CRA was introduced in 2024. It obliges businesses to ensure any hardware or software with a digital component sold within EU are manufactured are designed more securely.

Data protection Guidance Framework

Data Use and Access - a Guidance document for what the changes brought in by the Data Use and Access Act 2025 mean for the chosen client/client group

Cover Image

AI for All – WatsonPet

Create a mobile phone based ‘pet’

Cover Image

EcoGranite: Fuel Efficiency Coach

Analyze OBD-II data to identify inefficient driving patterns and provide personalized fuel-saving tips

Cover Image

Pattern of life for Cyber and Electromagnetic Activities (CEMA)

Scope here covers behaviours in cyber space and electromagnetic (radio) signals.

Cover Image

Real time software reconfiguration

Software and Hardware architectures for assured remote reprogramming

Cover Image

Rapid SOA workflow development

An approach to designing user interfaces for SOA to make workflow creation and management fast and easy

Cover Image

Threat Modelling for Secure by Design processes

Improving the understanding and application of Threat Modelling, for non-security experts.

Data Timeline Infographic Automation Project - Dorset Police is the client for this project

Dorset police are looking for a student to develop a software prototype that can work with/ingest the produced data from the electronic reports (Excel and/or PDF), generated by Cellebrite/ MSAB, and then output a more streamlined/condensed and digestible reviewing document/format that would provide instant feedback within review.

Cover Image

Solutions for cohering risk appetite statements with risk models

Identify and evaluate solutions for cohering risk appetite statements with risk models

© 2025 - Bournemouth University