Uploaded on May 27, 2021
Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering. Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher. Learn More: https://bit.ly/3bWsGpz Contact Us: Website: https://www.phdassistance.com/ UK NO: +44–1143520021 India No: +91–4448137070 WhatsApp No: +91 91769 66446 Email: [email protected]
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
An Academic presentation by
Dr. Nancy Agnes, Head, Technical Operations,
Phdassistance Group www.phdassistance.com
Email: [email protected]
TODAY'S
DISCUSSION
Outline
Find research topic
Creating a structure to improve the durability of embedded
devices 5th generation security telecommunications
services
AI in Cybersecurity
Use of ML/DL in Cyber security
Anonymity and confidentiality in an IoT
environment Wireless, ubiquitous, and
dependable IoT device control Conclusion
FIND RESEARCH
TOPIC
Dissertations are among the most important
pieces of work which students complete at
university.
And they allow you to work individually
and on something that truly attracts you.
Computer science is a hot field for researchers.
Many topic ideas can be generated for a
dissertation in this special branch of
engineering.
Contd...
Project management, AI, computer networks
or applications, security, information
systems, and the virtualization of
computer interfaces are all major fields of
research in the field of computer science.
So it is easy to find topics for dissertation
in this field but students often get
overwhelmed by the huge number of
choices they are offered.
Let’s explore some of them:
CREATING A
STRUCTURE TO
IMPROVE THE
DURABILITY OF
EMBEDDED DEVICES
Embedded devices are vulnerable to
external disruptions such as high-energy
particles, electromagnetic interference,
and temperature changes.
These things cause run-time errors
in the
executing program.
As a consequence, expertise with
software- implemented durability
approaches to diagnose these run-time
errors can be obtained.
Contd...
PROJECT GOAL
The goal of this concept is to transform the findings of previous studies into
a resilience system.
That will allowan organization to setup a consulting business
for resilient embedded software.
The idea will not only reinforce the establishedresilience methodson
industrial embedded software by using many industrial use cases.
It will also expand the enabling software to accommodate a broader variety
of hardware and industrial requirements.
5TH GENERATION SECURITY
TELECOMMUNICATIONS
SERVICES
The telecom industry is transitioning to virtualized
and structured ecosystems.
This facilitates the implementation of Virtual
Network Functions (VNFs) on cloud networks and
network slicing (Liu and Liu, 2021).
Modern lightweight virtualization technologies
(Docker) and container orchestration frameworks
(Kubernetes) add to this driver
Contd...
But they do not satisfy the strict security standards of communication
systems.
PROJECT OBJECTIVES
To form an international and inter-disciplinary study community.
This will consist of Early-Stage-Researchers (ESRs) and senior Researchers.
The ESRs will gain transferable soft and tech skills, that will help them
advance their careers in the telecom industry (Ahmed et al.,2021).
Contd...
The innovative project model will attain intellectual excellence and
leadership-driven study.
This will also give rise to a clear industry- and innovation-oriented
mentality, to develop strategic skills for securing future mobile networks,
with a comprehensive understanding of legal and business perspectives.
To plan, deploy, and launch a series of key components for stable
lightweight virtualization and container orchestration technologies for
emerging 5G networks.
Contd...
That will provide a solid, well-
understood, and structured notion of
protection while still complying with
legal data privacy requirements.
These key elements would be a vital
asset in the telecom company's
success in 5G growth.
AI IN
CYGBivEenRtShEatCAUI aRppITlicYations are
mbeocroemcianpgable and as
autonomous learn through they
Cyberseexcpuerritiye nce(C, S) can prAoIgress
beyond the existing stagnant phinase of
data analytics, which is neither
adaptive nor self- learning (Asif et
al.,2021).
In light of this, cybersecurity
researchers should use existing AI
technologies to progress.
Contd...
Some of the recent research
topics are
Practical AI for Cybersecurity
Role of artificial intelligencein
the Internet of things
(IoT) cybersecurity
AI reflections in 2020
USE OF M L/DL IN CYBER
SETChUeyR shITouYld use their experience of ML and
DL in security analytics use cases to
examine the functional constraints and
precision versus computational complexity
trade-offs of ML for CS adoption (Sarker,
2021).
It will strengthen ML's effectiveness in
hostile environments for parallel
defense use cases.
Contd...
PROJECT BENEFIT
This project's expertise will be
extended in industrial use cases in the CS
realms of data governance, network
management, and firmware safety.
Such research would greatly advance AI for
CS. It will result in innovative security
technologies that are much superior to the
recent advancements.
Contd...
Some of the research topics are
Cyber Attack Detection Using
Spatio Temporal Patterns
Cyber Security with AI—Part I
Performance evaluation of
Convolutional Neural Network for
web security
ANONYM ITY AND
CONFIDENTIALITY IN
AN IOT
ENTVhisI RidOeaN seMeksE sNuitTable solutions for
implementing advanced access
control in an IoT space.
The new methods would allow for
greater flexibility, resilience, and
protection for IoT devices.
Contd...
This will do so by using IoT systems to
evaluate the user's scope righteously and
then modifying the appropriate
authentication protocol and the current
authorization rules based on this scenario
(Shahidinejad et al., 2021).
Furthermore, some of the implementations
can be used to cover a subset of the IoT
devices operated by the customer.
Contd...
Some of the recent research topics are
Lightweight and Anonymity-
Preserving User Authentication
Scheme for IoT-based Healthcare
An anonymity communication
protocol for security and privacy of
clients in IoT-based mobile health
transactions
WIRELESS, UBIQUITOUS, AND
DEPENDABLE IOT DEVICE
CONTROL
Condition-based monitoring (CBM) in industrial
environments integrates sensors and data
processing to track machines and operations.
This enhances product efficiency and minimizes
downtime (Nacchia et al.,2021). Working without
cables shortens sensor startup times.
It also lowers installation costs, and allows
measurements deep within a system.
However, cutting network and power cables lead
to major computing and energy management
problems.
Contd...
PURPOSE OF THE PROJECT
This studywouldestablish a revolutionary CBM approach
that will reduce sensor cables while retaining data quality and
reliability (Valeti. and Pakzad, 2021).
By continuous, auto-monitoring of system energy usage, this approach
will ensure a multi-decade operational life.
It lowersbandwidth requirements on sluggish,
restricted wireless IoTnetworksby using data processing
specific to the application on the sensor itself
Contd...
The resulting
hardware/software prototype
will have an extended
developer-specified lifespan.
This can withstand harsh
operating conditions, and can
be remotely reconfigured.
CONCLUSI
ONThe study of comp
uters and technical processes is often
referred to as computer science.
It also points to the philosophies and practices
that have been implemented to strengthen
information technology (IT).
So vast is this world of computer science
that there is no shortage of dissertation topic
ideas.
I hope this blog has given you some ideas
about what subject you can pick for your
dissertation.
CONTACT
US
UNITED KINGDOM
+44-1143520021
INDIA
+91-4448137070
EMAIL
[email protected]
om
Comments