Computer Science Thesis Topics

List of 51 Computer Science Thesis Topics

CS PhD Thesis Topics

  1. Authentication Mechanisms for Open Distributed Systems
  2. Enhanced Security Models for Network Protocols
  3. Factor Graphs for Relational Regression
  4. Geometric Modeling with High Order Derivatives
  5. Joint Inference for Information Extraction and Translation
  6. New Design Criteria for Hash Functions and Block Ciphers
  7. Scaling Data Servers via Cooperative Caching
  8. Shape Analysis by Abstraction, Augmentation, and Transformation
  9. Synthesizing Executable Programs from Requirements
  10. Verification of Transactional Memories and Recursive Programs
  11. CS Masters Thesis Topics
  12. Categorizing Non-Functional Requirements Using a Hierarchy in UML
  13. Comparison of Inheritance Evaluation Algorithms for EXPRESS Edition 3
  14. Data Mining with Newton’s Method
  15. Extensions to OpenGL for CAGD
  16. Integrated Software System for the Collection and Evaluation of Wellness Information
  17. Requirement elicitation of large web projects
  18. Scalable and Reliable File Transfer for Clusters using Multicast
  19. Semantic Modeling For Schema Translation
  20. Strategies for Encoding XML Documents in Relational Databases: Comparisons and Contrasts
  21. The Challenges of Network Security Remediation at a Regional University

Software, Programming and Algorithm

  1. An adaptive web-based learning environment
  2. Analysis, design and implementation of web services security framework
  3. Development of room scheduling and work mapping system using software frameworks like Microsoft .NET Framework
  4. Development of web based document management system by using markup languages like J2EE, XML and Microsoft SQL Server
  5. Different techniques for designing intelligent interfaces for database systems, which provide a paradigm for programming databases without the knowledge of SQL and tables
  6. Different techniques for testing embedded software systems
  7. Fault-Tolerance analysis of sorting networks
  8. Fault-Tolerant Routing in interconnection networks with multiple passes and fixed control variables
  9. Hardware and/or high speed computer arithmetic using the residue number system
  10. Implementation and evaluation of fast algorithms for One-Way Hashing Functions
  11. Implementation and evaluation of heuristic algorithm for computing association rules
  12. Implementation and evaluation of heuristic algorithm for generating clusters
  13. Implementation and evaluation of heuristic algorithm for generating optimal and near optimal classification trees
  14. Implementation and evaluation of optimal algorithm for computing association rules in certain environment
  15. Implementation and evaluation of optimal algorithm for generating clusters
  16. Implementation and evaluation of optimal algorithm for generating optimal and near optimal classification trees
  17. Methods to design a dynamic proxy based architecture to support distributed java objects in a mobile environment
  18. Modular data serialization and mobile code
  19. Various ways to improve Open Web Architectures

Hardware, Network and Security

  1. Analysis of network security using a programmatic approach.
  2. Explore the use of intrusion detection systems for intelligent analysis of data across multiple gateways.
  3. How to design a secure, scalable and component-based Network Monitoring tool using struts and hibernates.
  4. How to design and implement a distributed file sharing system used for supporting content mobility and disconnection tolerant communication?
  5. How to design efficient Intrusion Detection System for 4G networks?
  6. How to develop a secure runtime/programming environment for studying the behaviour of malicious botnets and network worms?
  7. How to prevent relay attacks and improve the security of smart card network transmissions?
  8. Potential Privacy and Security Risks when authenticating on the Internet with Electronic ID cards.
  9. Scalable Router placement in software-defined networks.
  10. What are the different security mechanisms in IEEE 802.11-based WLANs?
  11. What are the different strategic and methodological approaches for the development of ICT systems?

Leave a Сomment