SlideShare a Scribd company logo
An Academic presentation by
Dr. Nancy Agnes, Head, Technical Operations, Phdassistance
Group www.phdassistance.com
Email: info@phdassistance.com
Outline
Find research topic
Creating a structure to improve the durability of embedded devices
5th generation security telecommunications services
AI in Cybersecurity
Use of ML/DL in Cyber security
Anonymity and confidentiality in an IoT environment
Wireless, ubiquitous, and dependable IoT device control
Conclusion
TODAY'S DISCUSSION
FIND RESEARCH TOPIC
Dissertations are among the most important pieces of
work which students complete at university.
And they allow you to work individually and on
something that truly attracts you.
Computer science is a hot field for researchers.
Many topic ideas can be generated for a dissertation
in this special branch of engineering.
Contd...
Project management, AI, computer networks or
applications, security, information systems, and
the virtualization of computer interfaces are all
major fields of research in the field of computer
science.
So it is easy to find topics for dissertation in this
field but students often get overwhelmed by the
huge number of choices they are offered.
Let’s explore some of them:
CREATING A STRUCTURE
TO IMPROVE THE
DURABILITY OF
EMBEDDED DEVICES
Embedded devices are vulnerable to external
disruptions such as high-energy particles,
electromagnetic interference, and temperature
changes.
These things cause run-time errors in the
executing program.
As a consequence, expertise with software-
implemented durability approaches to
diagnose these run-time errors can be
obtained.
Contd...
The goal of this concept is to transform the findings of previous studies into a resilience
system.
That will allow an organization to set up a consulting business for resilient embedded
software.
The idea will not only reinforce the established resilience methods on industrial
embedded software by using many industrial use cases.
It will also expand the enabling software to accommodate a broader variety of hardware
and industrial requirements.
PROJECT GOAL
5TH GENERATION SECURITY
TELECOMMUNICATIONSSERVICES
The telecom industry is transitioning to virtualized and
structured ecosystems.
This facilitates the implementation of Virtual Network
Functions (VNFs) on cloud networks and network slicing
(Liu and Liu, 2021).
Modern lightweight virtualization technologies (Docker)
and container orchestration frameworks (Kubernetes)
add to this driver
Contd...
But they do not satisfy the strict security standards of communication systems.
PROJECT OBJECTIVES
To form an international and inter-disciplinary study community.
This will consist of Early-Stage-Researchers (ESRs) and senior Researchers.
The ESRs will gain transferable soft and tech skills, that will help them advance their
careers in the telecom industry (Ahmed et al.,2021).
Contd...
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
The innovative project model will attain intellectual excellence and leadership-driven
study.
This will also give rise to a clear industry- and innovation-oriented mentality, to
develop strategic skills for securing future mobile networks, with a comprehensive
understanding of legal and business perspectives.
To plan, deploy, and launch a series of key components for stable lightweight
virtualization and container orchestration technologies for emerging 5G networks.
Contd...
That will provide a solid, well-understood,
and structured notion of protection while
still complying with legal data privacy
requirements.
These key elements would be a vital
asset in the telecom company's success
in 5G growth.
Given that AI applications are becoming
more capable and autonomous
learn through experience,
as they
AI in
AI IN CYBERSECURITY
Cybersecurity (CS) can progress beyond
the existing stagnant phase of data
analytics, which is neither adaptive nor self-
learning (Asif et al.,2021).
In light of this, cybersecurity researchers
should use existing AI technologies to
progress.
Contd...
Some of the recent research topics are
Practical AI for Cybersecurity
Role of artificial intelligence in the
Internet of things (IoT) cybersecurity
AI reflections in 2020
USE OF M L/DL IN CYBER SECURITY
They should use their experience of ML and DL in
security analytics use cases to examine the
functional constraints and precision versus
computational complexity trade-offs of ML for CS
adoption (Sarker, 2021).
It will strengthen ML's effectiveness in hostile
environments for parallel defense use cases.
Contd...
PROJECT BENEFIT
This project's expertise will be extended in industrial
use cases in the CS realms of data governance,
network management, and firmware safety.
Such research would greatly advance AI for CS. It
will result in innovative security technologies that
are much superior to the recent advancements.
Contd...
Some of the research topics are
Cyber Attack Detection Using Spatio
Temporal Patterns
Cyber Security with AI—Part I
Performance evaluation of Convolutional
Neural Network for web security
ANONYM ITY AND
CONFIDENTIALITY IN
AN IOT ENVIRONM ENT
This idea seeks suitable solutions for
implementing advanced access control in
an IoT space.
The new methods would allow for greater
flexibility, resilience, and protection for IoT
devices.
Contd...
This will do so by using IoT systems to evaluate
the user's scope righteously and then modifying
the appropriate authentication protocol and the
current authorization rules based on this
scenario (Shahidinejad et al., 2021).
Furthermore, some of the implementations can
be used to cover a subset of the IoT devices
operated by the customer.
Contd...
Some of the recent research topics are
Lightweight and Anonymity-Preserving
User Authentication Scheme for IoT-based
Healthcare
An anonymity communication protocol for
security and privacy of clients in IoT-based
mobile health transactions
WIRELESS, UBIQUITOUS, AND
DEPENDABLE IOT DEVICE CONTROL
Condition-based monitoring (CBM) in industrial
environments integrates sensors and data processing to
track machines and operations.
This enhances product efficiency and minimizes
downtime (Nacchia et al.,2021). Working without cables
shortens sensor startup times.
It also lowers installation costs, and allows
measurements deep within a system.
However, cutting network and power cables lead to
major computing and energy management problems.
Contd...
PURPOSE OF THE PROJECT
This study would establish a revolutionary CBM approach that will reduce sensor
cables while retaining data quality and reliability (Valeti. and Pakzad, 2021).
By continuous, auto-monitoring of system energy usage, this approach will ensure a
multi-decade operational life.
It lowers bandwidth requirements on sluggish, restricted wireless IoT networks by
using data processing specific to the application on the sensor itself
Contd...
The resulting hardware/software
prototype will have an extended
developer-specified lifespan.
This can withstand harsh operating
conditions, and can be remotely
reconfigured.
The study of computers and technical processes is
often referred to as computer science.
It also points to the philosophies and practices that
have been implemented to strengthen information
technology (IT).
So vast is this world of computer science that there
is no shortage of dissertation topic ideas.
I hope this blog has given you some ideas about
what subject you can pick for your dissertation.
CONCLUSION
CONTACT US
UNITED KINGDOM
+44-1143520021
INDIA
+91-4448137070
EMAIL
info@phdassistance.com

More Related Content

PDF
76 s201918
PDF
Research proposal on Computing Security and Reliability - Phdassistance.com
PDF
Io t security_review_blockchain_solutions
PPTX
Research proposal on Computing Security and Reliability - Phdassistance.com
DOCX
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
PDF
15CS81 Module1 IoT
PDF
Novel authentication framework for securing communication in internet-of-things
PDF
2015 security for the internet of things a survey of
76 s201918
Research proposal on Computing Security and Reliability - Phdassistance.com
Io t security_review_blockchain_solutions
Research proposal on Computing Security and Reliability - Phdassistance.com
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
15CS81 Module1 IoT
Novel authentication framework for securing communication in internet-of-things
2015 security for the internet of things a survey of

What's hot (6)

PDF
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
PPTX
Towards Cyber-Physical System technologies over Apache VCL
PDF
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
PDF
2012 2013 ieee java projects richbraintechnologies
PDF
IRJET - A Study on Smart Way for Securing IoT Devices
DOCX
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
Towards Cyber-Physical System technologies over Apache VCL
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
2012 2013 ieee java projects richbraintechnologies
IRJET - A Study on Smart Way for Securing IoT Devices
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ad

Similar to Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance (20)

PDF
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
PPTX
seminar ppt.pptx
DOCX
Wireless body area network
PDF
Security and Privacy Aware Programming Model for IoT Applications in Cloud En...
PDF
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
PDF
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
PDF
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
PDF
An IOT Based Low Power Health Monitoring with Active Personal Assistance
PPTX
Iot Report
PDF
A Novel Security Approach for Communication using IOT
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
PDF
Automated diagnosis of attacks in internet of things using machine learning a...
PPTX
PPTX
PDF
A novel deep anomaly detection approach for intrusion detection in futuristic...
PDF
Survey Paper On Real Time Smart CCTV Surveillance System
PDF
A new algorithm to enhance security against cyber threats for internet of thi...
PDF
Fog-Computing-Applications.pdf
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
seminar ppt.pptx
Wireless body area network
Security and Privacy Aware Programming Model for IoT Applications in Cloud En...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
An IOT Based Low Power Health Monitoring with Active Personal Assistance
Iot Report
A Novel Security Approach for Communication using IOT
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
Automated diagnosis of attacks in internet of things using machine learning a...
A novel deep anomaly detection approach for intrusion detection in futuristic...
Survey Paper On Real Time Smart CCTV Surveillance System
A new algorithm to enhance security against cyber threats for internet of thi...
Fog-Computing-Applications.pdf
Ad

More from PhD Assistance (20)

PDF
The relationship between clinical and biochemical findings with diabetic keto...
PPTX
Referencing an Article - Its styles and type.pptx
PDF
Referencing an Article - Its styles and type.pdf
PPTX
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
PDF
Current and future developments in cultural psychology of inequality in PhD r...
PDF
Quantum Machine Learning is all you Need – PhD Assistance.pdf
PPTX
Nutritional Interventional trials in muscle and cachexia PhD research directi...
PDF
Nutritional Interventional trials in muscle and cachexia PhD research directi...
PDF
7 Major Types of Cyber Security Threats.pdf
PDF
Machine Learning Algorithm for Business Strategy.pdf
PPTX
Key Factors Influencing Customer Purchasing Behavior.pptx
PDF
Key Factors Influencing Customer Purchasing Behavior.pdf
PPTX
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
PDF
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
PPTX
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
PDF
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
PPTX
An overview of cyber security data science from a perspective of machine lear...
PDF
An overview of cyber security data science from a perspective of machine lear...
PDF
Selecting a Research Topic - Framework for Doctoral Students.pdf
PDF
Identifying and Formulating the Research Problem in Food and Nutrition Study ...
The relationship between clinical and biochemical findings with diabetic keto...
Referencing an Article - Its styles and type.pptx
Referencing an Article - Its styles and type.pdf
ROLE OF COMMUNITY TO BOOST MENTAL HEALTH .pptx
Current and future developments in cultural psychology of inequality in PhD r...
Quantum Machine Learning is all you Need – PhD Assistance.pdf
Nutritional Interventional trials in muscle and cachexia PhD research directi...
Nutritional Interventional trials in muscle and cachexia PhD research directi...
7 Major Types of Cyber Security Threats.pdf
Machine Learning Algorithm for Business Strategy.pdf
Key Factors Influencing Customer Purchasing Behavior.pptx
Key Factors Influencing Customer Purchasing Behavior.pdf
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pptx
Factors Contributing and Counter Measure in Drowsiness Detection of Drivers.pdf
Immigrant’s Potentials to Emerge as Entrepreneurs.pptx
Immigrant’s Potentials to Emerge as Entrepreneurs - PhD Assistance.pdf
An overview of cyber security data science from a perspective of machine lear...
An overview of cyber security data science from a perspective of machine lear...
Selecting a Research Topic - Framework for Doctoral Students.pdf
Identifying and Formulating the Research Problem in Food and Nutrition Study ...

Recently uploaded (20)

PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Introduction to Building Materials
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Lesson notes of climatology university.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
advance database management system book.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
A systematic review of self-coping strategies used by university students to ...
Introduction to Building Materials
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Lesson notes of climatology university.
Supply Chain Operations Speaking Notes -ICLT Program
advance database management system book.pdf
IGGE1 Understanding the Self1234567891011
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Unit 4 Skeletal System.ppt.pptxopresentatiom
Paper A Mock Exam 9_ Attempt review.pdf.
History, Philosophy and sociology of education (1).pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer

Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance

  • 1. An Academic presentation by Dr. Nancy Agnes, Head, Technical Operations, Phdassistance Group www.phdassistance.com Email: [email protected]
  • 2. Outline Find research topic Creating a structure to improve the durability of embedded devices 5th generation security telecommunications services AI in Cybersecurity Use of ML/DL in Cyber security Anonymity and confidentiality in an IoT environment Wireless, ubiquitous, and dependable IoT device control Conclusion TODAY'S DISCUSSION
  • 3. FIND RESEARCH TOPIC Dissertations are among the most important pieces of work which students complete at university. And they allow you to work individually and on something that truly attracts you. Computer science is a hot field for researchers. Many topic ideas can be generated for a dissertation in this special branch of engineering. Contd...
  • 4. Project management, AI, computer networks or applications, security, information systems, and the virtualization of computer interfaces are all major fields of research in the field of computer science. So it is easy to find topics for dissertation in this field but students often get overwhelmed by the huge number of choices they are offered. Let’s explore some of them:
  • 5. CREATING A STRUCTURE TO IMPROVE THE DURABILITY OF EMBEDDED DEVICES
  • 6. Embedded devices are vulnerable to external disruptions such as high-energy particles, electromagnetic interference, and temperature changes. These things cause run-time errors in the executing program. As a consequence, expertise with software- implemented durability approaches to diagnose these run-time errors can be obtained. Contd...
  • 7. The goal of this concept is to transform the findings of previous studies into a resilience system. That will allow an organization to set up a consulting business for resilient embedded software. The idea will not only reinforce the established resilience methods on industrial embedded software by using many industrial use cases. It will also expand the enabling software to accommodate a broader variety of hardware and industrial requirements. PROJECT GOAL
  • 8. 5TH GENERATION SECURITY TELECOMMUNICATIONSSERVICES The telecom industry is transitioning to virtualized and structured ecosystems. This facilitates the implementation of Virtual Network Functions (VNFs) on cloud networks and network slicing (Liu and Liu, 2021). Modern lightweight virtualization technologies (Docker) and container orchestration frameworks (Kubernetes) add to this driver Contd...
  • 9. But they do not satisfy the strict security standards of communication systems. PROJECT OBJECTIVES To form an international and inter-disciplinary study community. This will consist of Early-Stage-Researchers (ESRs) and senior Researchers. The ESRs will gain transferable soft and tech skills, that will help them advance their careers in the telecom industry (Ahmed et al.,2021). Contd...
  • 11. The innovative project model will attain intellectual excellence and leadership-driven study. This will also give rise to a clear industry- and innovation-oriented mentality, to develop strategic skills for securing future mobile networks, with a comprehensive understanding of legal and business perspectives. To plan, deploy, and launch a series of key components for stable lightweight virtualization and container orchestration technologies for emerging 5G networks. Contd...
  • 12. That will provide a solid, well-understood, and structured notion of protection while still complying with legal data privacy requirements. These key elements would be a vital asset in the telecom company's success in 5G growth.
  • 13. Given that AI applications are becoming more capable and autonomous learn through experience, as they AI in AI IN CYBERSECURITY Cybersecurity (CS) can progress beyond the existing stagnant phase of data analytics, which is neither adaptive nor self- learning (Asif et al.,2021). In light of this, cybersecurity researchers should use existing AI technologies to progress. Contd...
  • 14. Some of the recent research topics are Practical AI for Cybersecurity Role of artificial intelligence in the Internet of things (IoT) cybersecurity AI reflections in 2020
  • 15. USE OF M L/DL IN CYBER SECURITY They should use their experience of ML and DL in security analytics use cases to examine the functional constraints and precision versus computational complexity trade-offs of ML for CS adoption (Sarker, 2021). It will strengthen ML's effectiveness in hostile environments for parallel defense use cases. Contd...
  • 16. PROJECT BENEFIT This project's expertise will be extended in industrial use cases in the CS realms of data governance, network management, and firmware safety. Such research would greatly advance AI for CS. It will result in innovative security technologies that are much superior to the recent advancements. Contd...
  • 17. Some of the research topics are Cyber Attack Detection Using Spatio Temporal Patterns Cyber Security with AI—Part I Performance evaluation of Convolutional Neural Network for web security
  • 18. ANONYM ITY AND CONFIDENTIALITY IN AN IOT ENVIRONM ENT This idea seeks suitable solutions for implementing advanced access control in an IoT space. The new methods would allow for greater flexibility, resilience, and protection for IoT devices. Contd...
  • 19. This will do so by using IoT systems to evaluate the user's scope righteously and then modifying the appropriate authentication protocol and the current authorization rules based on this scenario (Shahidinejad et al., 2021). Furthermore, some of the implementations can be used to cover a subset of the IoT devices operated by the customer. Contd...
  • 20. Some of the recent research topics are Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-based Healthcare An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions
  • 22. Condition-based monitoring (CBM) in industrial environments integrates sensors and data processing to track machines and operations. This enhances product efficiency and minimizes downtime (Nacchia et al.,2021). Working without cables shortens sensor startup times. It also lowers installation costs, and allows measurements deep within a system. However, cutting network and power cables lead to major computing and energy management problems. Contd...
  • 23. PURPOSE OF THE PROJECT This study would establish a revolutionary CBM approach that will reduce sensor cables while retaining data quality and reliability (Valeti. and Pakzad, 2021). By continuous, auto-monitoring of system energy usage, this approach will ensure a multi-decade operational life. It lowers bandwidth requirements on sluggish, restricted wireless IoT networks by using data processing specific to the application on the sensor itself Contd...
  • 24. The resulting hardware/software prototype will have an extended developer-specified lifespan. This can withstand harsh operating conditions, and can be remotely reconfigured.
  • 25. The study of computers and technical processes is often referred to as computer science. It also points to the philosophies and practices that have been implemented to strengthen information technology (IT). So vast is this world of computer science that there is no shortage of dissertation topic ideas. I hope this blog has given you some ideas about what subject you can pick for your dissertation. CONCLUSION