Computer Science Thesis Topics

by Loraine Walters
Created: 22.03.2019
Updated: 11.04.2020

List of 51 Computer Science Thesis Topics

CS PhD Thesis Topics

  1. Authentication Mechanisms for Open Distributed Systems
  2. Enhanced Security Models for Network Protocols
  3. Factor Graphs for Relational Regression
  4. Geometric Modeling with High Order Derivatives
  5. Joint Inference for Information Extraction and Translation
  6. New Design Criteria for Hash Functions and Block Ciphers
  7. Scaling Data Servers via Cooperative Caching
  8. Shape Analysis by Abstraction, Augmentation, and Transformation
  9. Synthesizing Executable Programs from Requirements
  10. Verification of Transactional Memories and Recursive Programs
  11. CS Masters Thesis Topics
  12. Our PartnerGet your thesis written by a professional writer 
    writing partner
  13. Categorizing Non-Functional Requirements Using a Hierarchy in UML
  14. Comparison of Inheritance Evaluation Algorithms for EXPRESS Edition 3
  15. Data Mining with Newton’s Method
  16. Extensions to OpenGL for CAGD
  17. Integrated Software System for the Collection and Evaluation of Wellness Information
  18. Requirement elicitation of large web projects
  19. Scalable and Reliable File Transfer for Clusters using Multicast
  20. Semantic Modeling For Schema Translation
  21. Strategies for Encoding XML Documents in Relational Databases: Comparisons and Contrasts
  22. The Challenges of Network Security Remediation at a Regional University

Software, Programming and Algorithm

  1. An adaptive web-based learning environment
  2. Analysis, design and implementation of web services security framework
  3. Development of room scheduling and work mapping system using software frameworks like Microsoft .NET Framework
  4. Development of web based document management system by using markup languages like J2EE, XML and Microsoft SQL Server
  5. Different techniques for designing intelligent interfaces for database systems, which provide a paradigm for programming databases without the knowledge of SQL and tables
  6. Different techniques for testing embedded software systems
  7. Fault-Tolerance analysis of sorting networks
  8. Fault-Tolerant Routing in interconnection networks with multiple passes and fixed control variables
  9. Hardware and/or high speed computer arithmetic using the residue number system
  10. Implementation and evaluation of fast algorithms for One-Way Hashing Functions
  11. Implementation and evaluation of heuristic algorithm for computing association rules
  12. Implementation and evaluation of heuristic algorithm for generating clusters
  13. Implementation and evaluation of heuristic algorithm for generating optimal and near optimal classification trees
  14. Implementation and evaluation of optimal algorithm for computing association rules in certain environment
  15. Implementation and evaluation of optimal algorithm for generating clusters
  16. Implementation and evaluation of optimal algorithm for generating optimal and near optimal classification trees
  17. Methods to design a dynamic proxy based architecture to support distributed java objects in a mobile environment
  18. Modular data serialization and mobile code
  19. Various ways to improve Open Web Architectures

Hardware, Network and Security

  1. Analysis of network security using a programmatic approach.
  2. Explore the use of intrusion detection systems for intelligent analysis of data across multiple gateways.
  3. How to design a secure, scalable and component-based Network Monitoring tool using struts and hibernates.
  4. How to design and implement a distributed file sharing system used for supporting content mobility and disconnection tolerant communication?
  5. How to design efficient Intrusion Detection System for 4G networks?
  6. How to develop a secure runtime/programming environment for studying the behaviour of malicious botnets and network worms?
  7. How to prevent relay attacks and improve the security of smart card network transmissions?
  8. Potential Privacy and Security Risks when authenticating on the Internet with Electronic ID cards.
  9. Scalable Router placement in software-defined networks.
  10. What are the different security mechanisms in IEEE 802.11-based WLANs?
  11. What are the different strategic and methodological approaches for the development of ICT systems?

Leave a Сomment