computer science dissertation topic ideas for phd scholar - phdassistance
DESCRIPTION
Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering. Ph.D. Assistance serves as an external mentor to brainstorm your idea and translate that into a research model. Hiring a mentor or tutor is common and therefore let your research committee know about the same. We do not offer any writing services without the involvement of the researcher. Learn More: https://bit.ly/3bWsGpz Contact Us: Website: https://www.phdassistance.com/ UK NO: +44–1143520021 India No: +91–4448137070 WhatsApp No: +91 91769 66446 Email: [email protected]TRANSCRIPT
Copyright © 2021 Phdassistance. All rights reserved 1
COMPUTER SCIENCE DISSERTATION
TOPIC IDEAS FOR PHD SCHOLAR
Dr. Nancy Agnes, Head, Technical Operations, Phdassistance [email protected]
Keywords: Dissertations, computer science, research
topics, research idea, embedded devices, telecom
industry, lightweight virtualization technologies, AI in
Cybersecurity
I. FIND RESEARCH TOPIC
Dissertations are among the most important pieces of
work which students complete at university. And they
allow you to work individually and on something that
truly attracts you. Computer science is a hot field for
researchers. Many topic ideas can be generated for a
dissertation in this special branch of engineering.
Project management, AI, computer networks or
applications, security, information systems, and the
virtualization of computer interfaces are all major fields
of research in the field of computer science. So it is
easy to find topics for dissertation in this field but
students often get overwhelmed by the huge number of
choices they are offered. Let’s explore some of them:
II. CREATING A STRUCTURE TO IMPROVE
THE DURABILITY OF EMBEDDED DEVICES
Embedded devices are vulnerable to external
disruptions such as high-energy particles,
electromagnetic interference, and temperature changes.
These things cause run-time errors in the executing
program. As a consequence, expertise with software-
implemented durability approaches to diagnose these
run-time errors can be obtained.
Project Goal:
The goal of this concept is to transform the findings of
previous studies into a resilience system. That will
allow an organization to set up a consulting business for
resilient embedded software. The idea will not only
reinforce the established resilience methods on
industrial embedded software by using many industrial
use cases. It will also expand the enabling
software to accommodate a broader variety of hardware
and industrial requirements.
III. 5TH GENERATION SECURITY
TELECOMMUNICATIONS SERVICES
The telecom industry is transitioning to virtualized and
structured ecosystems. This facilitates the
implementation of Virtual Network Functions (VNFs)
on cloud networks and network slicing (Liu and Liu,
2021). Modern lightweight virtualization technologies
(Docker) and container orchestration frameworks
(Kubernetes) add to this driver. But they do not satisfy
the strict security standards of communication systems.
Project Objectives:
The objectives of this project idea are:
To form an international and inter-disciplinary
study community. This will consist of Early-Stage-
Researchers (ESRs) and senior Researchers. The
ESRs will gain transferable soft and tech skills, that
will help them advance their careers in the telecom
industry (Ahmed et al.,2021). The innovative
project model will attain intellectual excellence and
leadership-driven study. This will also give rise to
a clear industry- and innovation-oriented mentality,
to develop strategic skills for securing future
mobile networks, with a comprehensive
understanding of legal and business perspectives.
To plan, deploy, and launch a series of key
components for stable lightweight virtualization
and container orchestration technologies for
emerging 5G networks. That will provide a solid,
well-understood, and structured notion of
protection while still complying with legal data
privacy requirements. These key elements would
be a vital asset in the telecom company's success in
5G growth.
Copyright © 2021 Phdassistance. All rights reserved 2
IV. AI IN CYBERSECURITY
Given that AI applications are becoming more capable
and autonomous as they learn through experience, AI in
Cybersecurity (CS) can progress beyond the existing
stagnant phase of data analytics, which is neither
adaptive nor self-learning (Asif et al.,2021). In light of
this, cybersecurity researchers should use existing AI
technologies to progress. Some of the recent research
topics are
Practical AI for Cybersecurity
Role of artificial intelligence in the Internet of
Things (IoT) cybersecurity
AI reflections in 2020
V. USE OF ML/DL IN CYBER SECURITY
They should use their experience of ML and DL in
security analytics use cases to examine the functional
constraints and precision versus computational
complexity trade-offs of ML for CS adoption (Sarker,
2021). It will strengthen ML's effectiveness in hostile
environments for parallel defense use cases.
Project benefit:
This project's expertise will be extended in industrial
use cases in the CS realms of data governance, network
management, and firmware safety. Such research would
greatly advance AI for CS. It will result in innovative
security technologies that are much superior to the
recent advancements. Some of the research topics are
Cyber Attack Detection Using Spatio Temporal
Patterns
Cyber Security with AI—Part I
Performance evaluation of Convolutional Neural
Network for web security
VI. ANONYMITY AND CONFIDENTIALITY
IN AN IOT ENVIRONMENT
This idea seeks suitable solutions for implementing
advanced access control in an IoT space. The new
methods would allow for greater flexibility, resilience,
and protection for IoT devices. This will do so by using
IoT systems to evaluate the user's scope righteously and
Copyright © 2021 Phdassistance. All rights reserved 3
then modifying the appropriate authentication protocol
and the current authorization rules based on this
scenario (Shahidinejad et al., 2021). Furthermore, some
of the implementations can be used to cover a subset of
the IoT devices operated by the customer. Some of the
recent research topics are
Lightweight and Anonymity-Preserving User
Authentication Scheme for IoT-based Healthcare
An anonymity communication protocol for security
and privacy of clients in IoT-based mobile health
transactions
VII. WIRELESS, UBIQUITOUS, AND
DEPENDABLE IOT DEVICE CONTROL
Condition-based monitoring (CBM) in industrial
environments integrates sensors and data processing to
track machines and operations. This enhances product
efficiency and minimizes downtime (Nacchia et
al.,2021). Working without cables shortens sensor
startup times. It also lowers installation costs, and
allows measurements deep within a system. However,
cutting network and power cables lead to major
computing and energy management problems.
Purpose of the project:
This study would establish a revolutionary CBM
approach that will reduce sensor cables while retaining
data quality and reliability (Valeti. and Pakzad, 2021).
By continuous, auto-monitoring of system energy
usage, this approach will ensure a multi-decade
operational life. It lowers bandwidth requirements on
sluggish, restricted wireless IoT networks by using data
processing specific to the application on the sensor
itself.
The resulting hardware/software prototype will have an
extended developer-specified lifespan. This can
withstand harsh operating conditions, and can be
remotely reconfigured.
VIII. CONCLUSION
The study of computers and technical processes is often
referred to as computer science. It also points to the
philosophies and practices that have been implemented
to strengthen information technology (IT). So vast is
this world of computer science that there is no shortage
of dissertation topic ideas. I hope this blog has given
you some ideas about what subject you can pick for
your dissertation.
REFERENCE
1. Liu, M. and Liu, F., 2021. Research on Optimized
Deployment of Virtual Network Functions in
Network Function Virtualization Environment.
In Journal of Physics: Conference Series (Vol.
1748, No. 3, p. 032020). IOP Publishing.
2. Ahmed, S.Z., Hjorth, A., Rafner, J.F., Weidner,
C.A., Kragh, G., Jensen, J.H.M., Bobroff, J.,
Nielsen, K.H. and Sherson, J.F., 2021. A training
programme for early-stage researchers that focuses
on developing personal science outreach
portfolios. arXiv preprint arXiv:2103.03109.
3. Asif, R., Ghanem, K. and Irvine, J., 2021. Proof-of-
PUF enabled Blockchain: concurrent data and
device security for Internet-of-
Energy. Sensors, 21(1), p.28.
4. Sarker, I.H., 2021. Deep Cybersecurity: A
Comprehensive Overview from Neural Network
and Deep Learning Perspective.
5. Shahidinejad, A., Ghobaei-Arani, M., Souri, A.,
Shojafar, M. and Kumari, S., 2021. Light-Edge: A
Lightweight Authentication Protocol for IoT
Devices in an Edge-Cloud Environment. IEEE
Consumer Electronics Magazine.
6. Nacchia, M., Fruggiero, F., Lambiase, A. and
Bruton, K., 2021. A Systematic Mapping of the
Advancing Use of Machine Learning Techniques
for Predictive Maintenance in the Manufacturing
Sector. Applied Sciences, 11(6), p.2546.
7. Valeti, B. and Pakzad, S.N., 2021. Hybrid data+
model‐based submodeling method for a refined
response estimation at critical locations. Structural
Control and Health Monitoring, 28(1), p.e2646.
8. Muthirayan, D. and Khargonekar, P., 2021.
Cognitive Preadaptation for Resilient Adaptive
Control. In AIAA Scitech 2021 Forum (p. 0786).
9. Das, R. (2021). Practical AI for Cybersecurity.
10. Kuzlu, M., Fair, C., & Guler, O. (2021). Role of
artificial intelligence in the Internet of Things (IoT)
cybersecurity. Discover Internet of Things, 1(1), 1-
14.
11. Jobin, A., Man, K., Damasio, A., Kaissis, G.,
Braren, R., Stoyanovich, J., ... & Luengo-Oroz, M.
(2021). AI reflections in 2020. Nature Machine
Intelligence, 3(1), 2-8.
12. Anandamurugan, S., Dharani, M., Jaiaswath, R. G.,
& Jeeva, S. (2021). Cyber Attack Detection Using
Spatio Temporal Patterns. Annals of the Romanian
Society for Cell Biology, 1439-1447.
13. Chander, B., & Kumaravelan, G. (2021). Cyber
Security with AI—Part I. In The" Essence" of
Network Security: An End-to-End Panorama (pp.
147-171). Springer, Singapore.
Copyright © 2021 Phdassistance. All rights reserved 4
14. Jemal, I., Haddar, M. A., Cheikhrouhou, O., &
Mahfoudhi, A. (2021). Performance evaluation of
Convolutional Neural Network for web
security. Computer Communications.
15. Masud, M., Gaba, G. S., Choudhary, K., Hossain,
M. S., Alhamid, M. F., & Muhammad, G. (2021).
Lightweight and Anonymity-Preserving User
Authentication Scheme for IoT-based Healthcare.
IEEE Internet of Things Journal.
16. Attarian, R., & Hashemi, S. (2021). An anonymity
communication protocol for security and privacy of
clients in IoT-based mobile health transactions.
Computer Networks, 190, 107976.