Scholars' Mine

Home > Computer Science > CompSci TDs > Masters Theses

Computer Science Masters Theses

Theses from 2024 2024.

Enabling smart healthcare applications through visible light communication networks , Jack Manhardt

Time series anomaly detection using generative adversarial networks , Shyam Sundar Saravanan

Theses from 2023 2023

DYNAMIC DISCOUNTED SATISFICING BASED DRIVER DECISION PREDICTION IN SEQUENTIAL TAXI REQUESTS , Sree Pooja Akula

MAT: Genetic Algorithms Based Multi-Objective Adversarial Attack on Multi-Task Deep Neural Networks , Nikola Andric

COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT , Raja Sunkara

Theses from 2022 2022

Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers , Sainath Sanga

Man-in-the-Middle Attacks on MQTT based IoT networks , Henry C. Wong

Theses from 2021 2021

Biochemical assay invariant attestation for the security of cyber-physical digital microfluidic biochips , Fredrick Eugene Love II

Theses from 2020 2020

On predicting stopping time of human sequential decision-making using discounted satisficing heuristic , Mounica Devaguptapu

Theses from 2019 2019

Advanced techniques for improving canonical genetic programming , Adam Tyler Harter

Evolved parameterized selection for evolutionary algorithms , Samuel Nathan Richter

Design and implementation of applications over delay tolerant networks for disaster and battlefield environment , Karthikeyan Sachidanandam

Theses from 2018 2018

Mixed-criticality real-time task scheduling with graceful degradation , Samsil Arefin

CARD: Concealed and remote discovery of IoT devices in victims' home networks , Sammie Lee Bush

Multiple security domain non deducibility in the FREEDM smart grid infrastructure , Manish Jaisinghani

Reputation and credit based incentive mechanism for data-centric message delivery in delay tolerant networks , Himanshu Jethawa

Solidification rate detection through solid-liquid interface tracking , Wei Luo

Cloud transactions and caching for improved performance in clouds and DTNs , Dileep Mardham

Cyber-physical security of an electric microgrid , Prashanth Palaniswamy

An approach for formal analysis of the security of a water treatment testbed , Sai Sidharth Patlolla

Analyzing large scale trajectory data to identify users with similar behavior , Tyler Clark Percy

Precise energy efficient scheduling of mixed-criticality tasks & sustainable mixed-criticality scheduling , Sai Sruti

A network tomography approach for traffic monitoring in smart cities , Ruoxi Zhang

Improved CRPD analysis and a secure scheduler against information leakage in real-time systems , Ying Zhang

Theses from 2017 2017

Cyber-physical security of a chemical plant , Prakash Rao Dunaka

UFace: Your universal password no one can see , Nicholas Steven Hilbert

Multi stage recovery from large scale failure in interdependent networks , Maria Angelin John Bosco

Multiple security domain model of a vehicle in an automated vehicle system , Uday Ganesh Kanteti

Personalizing education with algorithmic course selection , Tyler Morrow

Decodable network coding in wireless network , Junwei Su

Multiple security domain nondeducibility air traffic surveillance systems , Anusha Thudimilla

Theses from 2016 2016

Automated design of boolean satisfiability solvers employing evolutionary computation , Alex Raymond Bertels

Care-Chair: Opportunistic health assessment with smart sensing on chair backrest , Rakesh Kumar

Theses from 2015 2015

Dependability analysis and recovery support for smart grids , Isam Abdulmunem Alobaidi

Sensor authentication in collaborating sensor networks , Jake Uriah Bielefeldt

Argumentation based collaborative software architecture design and intelligent analysis of software architecture rationale , NagaPrashanth Chanda

A Gaussian mixture model for automated vesicle fusion detection and classification , Haohan Li

Hyper-heuristics for the automated design of black-box search algorithms , Matthew Allen Martin

Aerial vehicle trajectory design for spatio-temporal task satisfaction and aggregation based on utility metric , Amarender Reddy Mekala

Design and implementation of a broker for cloud additive manufacturing services , Venkata Prashant Modekurthy

Cyber security research frameworks for coevolutionary network defense , George Daniel Rush

Energy disaggregation in NIALM using hidden Markov models , Anusha Sankara

Theses from 2014 2014

Crime pattern detection using online social media , Raja Ashok Bolla

Energy efficient scheduling and allocation of tasks in sensor cloud , Rashmi Dalvi

A cloud brokerage architecture for efficient cloud service selection , Venkata Nagarjuna Dondapati

Access control delegation in the clouds , Pavani Gorantla

Evolving decision trees for the categorization of software , Jasenko Hosic

M-Grid : A distributed framework for multidimensional indexing and querying of location based big data , Shashank Kumar

Privacy preservation using spherical chord , Doyal Tapan Mukherjee

Top-K with diversity-M data retrieval in wireless sensor networks , Kiran Kumar Puram

On temporal and frequency responses of smartphone accelerometers for explosives detection , Srinivas Chakravarthi Thandu

Efficient data access in mobile cloud computing , Siva Naga Venkata Chaitanya Vemulapalli

An empirical study on symptoms of heavier internet usage among young adults , SaiPreethi Vishwanathan

Theses from 2013 2013

Sybil detection in vehicular networks , Muhammad Ibrahim Almutaz

Argumentation placement recommendation and relevancy assessment in an intelligent argumentation system , Nian Liu

Security analysis of a cyber physical system : a car example , Jason Madden

Efficient integrity verification of replicated data in cloud , Raghul Mukundan

Search-based model summarization , Lokesh Krishna Ravichandran

Hybridizing and applying computational intelligence techniques , Jeffery Scott Shelburg

Secure design defects detection and correction , Wenquan Wang

Theses from 2012 2012

Robust evolutionary algorithms , Brian Wesley Goldman

Semantic preserving text tepresentation and its applications in text clustering , Michael Howard

Vehicle path verification using wireless sensor networks , Gerry W. Howser

Distributed and collaborative watermarking in relational data , Prakash Kumar

Theses from 2011 2011

A social network of service providers for trust and identity management in the Cloud , Makarand Bhonsle

Adaptive rule-based malware detection employing learning classifier systems , Jonathan Joseph Blount

A low-cost motion tracking system for virtual reality applications , Abhinav Chadda

Optimization of textual affect entity relation models , Ajith Cherukad Jose

MELOC - memory and location optimized caching for mobile Ad hoc networks , Lekshmi Manian Chidambaram

A framework for transparent depression classification in college settings via mining internet usage patterns , Raghavendra Kotikalapudi

An incentive based approach to detect selfish nodes in Mobile P2P network , Hemanth Meka

Location privacy policy management system , Arej Awodha Muhammed

Exploring join caching in programming codes to reduce runtime execution , Swetha Surapaneni

Theses from 2010 2010

Event detection from click-through data via query clustering , Prabhu Kumar Angajala

Population control in evolutionary algorithms , Jason Edward Cook

Dynamic ant colony optimization for globally optimizing consumer preferences , Pavitra Dhruvanarayana

EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination , Joshua Michael Eads

Representation and validation of domain and range restrictions in a relational database driven ontology maintenance system , Patrick Garrett. Edgett

Cloud security requirements analysis and security policy development using a high-order object-oriented modeling technique , Kenneth Kofi Fletcher

Multi axis slicing for rapid prototyping , Divya Kanakanala

Content based image retrieval for bio-medical images , Vikas Nahar

2-D path planning for direct laser deposition process , Swathi Routhu

Contribution-based priority assessment in a web-based intelligent argumentation network for collaborative software development , Maithili Satyavolu

An artificial life approach to evolutionary computation: from mobile cellular algorithms to artificial ecosystems , Shivakar Vulli

Intelligent computational argumentation for evaluating performance scores in multi-criteria decision making , Rubal Wanchoo

Minimize end-to-end delay through cross-layer optimization in multi-hop wireless sensor networks , Yibo Xu

Theses from 2009 2009

Information flow properties for cyber-physical systems , Rav Akella

Exploring the use of a commercial game engine for the development of educational software , Hussain Alafaireet

Automated offspring sizing in evolutionary algorithms , André Chidi Nwamba

Theses from 2008 2008

Image analysis techniques for vertebra anomaly detection in X-ray images , Mohammed Das

Cross-layer design through joint routing and link allocation in wireless sensor networks , Xuan Gong

A time series classifier , Christopher Mark Gore

An economic incentive based routing protocol incorporating quality of service for mobile peer-to-peer networks , Anil Jade

Incorporation of evidences in an intelligent argumentation network for collaborative engineering design , Ekta Khudkhudia

PrESerD - Privacy ensured service discovery in mobile peer-to-peer environment , Santhosh Muthyapu

Co-optimization: a generalization of coevolution , Travis Service

Critical infrastructure protection and the Domain Name Service (DNS) system , Mark Edward Snyder

Co-evolutionary automated software correction: a proof of concept , Joshua Lee Wilkerson

Theses from 2007 2007

A light-weight middleware framework for fault-tolerant and secure distributed applications , Ian Jacob Baird

Symbolic time series analysis using hidden Markov models , Nikhil Bhardwaj

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines
  • All Authors
  • Faculty Authors

Author Corner

Useful links.

  • Library Resources

S&T logo

Thesis Locations

  • View these on map
  • View these in Google Earth

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

EWU Digital Commons

Home > College, Department, or Program > CSTEM > Computer Science > Theses

Computer Science Masters Thesis Collection

Theses/dissertations from 2023 2023.

A hierarchical approach to improve the ant colony optimization algorith , Bryan J. Fischer

From Tic-tac-toe to AlphaGo: a survey of algorithms used in various games , Mathew T. Godon

Temporally consistent FastDVDNet: an overlap loss implementation for FastDVDNet , Michael J. Henderson

Multimodal game-based learning in Post-Secondary Education , Nathan A. Vanos

Theses/Dissertations from 2022 2022

Towards Cloud-Based cost-effective serverless information system , Isaac C. Angle

Modeling document classification to automate mental health diagnosis , William M. Tadlock

Theses/Dissertations from 2021 2021

Password-less two-factor authentication using scannable barcodes on a mobile device , Grant M. Callant II

Intrusion detection for industrial control systems , Kurt Lamon

Theses/Dissertations from 2020 2020

Data entry voice assistant for healthcare providers , Sajad Hussain M Alhamada

Comparison of the tally numbering system to traditional arithmetic systems in field programmable gate arrays , Robert Paul Shredow

Using Blockchain for Digital Card Game , Raymond A. Swannack

Theses/Dissertations from 2019 2019

Relaxed mental state detection using the Emotiv Epoc and Adaptive Threshold Algorithms , Olin L. Anderson

Detecting and mapping real-time Influenza-like illness using Twitter stream data , Elisha D. Brunette

The application of cloud resources to terrain data visualization , Gregory J. Larrick

Theses/Dissertations from 2018 2018

A practical and efficient algorithm for the k-mismatch shortest unique substring finding problem , Daniel Robert Allen

DETERMINING VULNERABILITY USING ATTACK GRAPHS: AN EXPANSION OF THE CURRENT FAIR MODEL , Beth M. Anderson

The application of GPU to molecular communication studies , Tobias J. Cain

Improving Aerial Package Delivery Through Simulation of Hazard Detection, Mapping, and Regulatory Compliance , Kevin Chumbley

GPU accelerated risk quantification , Forrest L. Ireland

Evaluating a Cluster of Low-Power ARM64 Single-Board Computers with MapReduce , Daniel McDermott

Glyph based segmentation of Chinese calligraphy characters in the "Collected Characters" stele. , David A. McInnis

Theses/Dissertations from 2017 2017

CLOUD LIVE VIDEO TRANSFER , Ryan Babcock

GENE EXPRESSION PROSPECTIVE SIMULATION AND ANALYSIS USING DATA MINING AND IMMERSIVE VIRTUAL REALITY VISUALIZATION , Joshua Cotes

Theses/Dissertations from 2016 2016

Near real-time early cancer detection using a graphics processing unit , Jason Helms

Analysis of algorithms to create profitable trades in the stock market , Nicholas P. Klinger

Dynamically parallel CAMSHIFT: GPU accelerated object tracking in digital video , Matthew J. Perry

USING CONVOLUTIONAL NEURAL NETWORKS FOR FINE GRAINED IMAGECLASSIFICATION OF ACUTE LYMPHOBLASTIC LEUKEMIA , Richard K. Sipes

Character extraction from ancient Chinese stele using discrete cosine transform , Toshiaki Ueno

Theses/Dissertations from 2015 2015

ECS: Educational Communication System , Nasmah Alnaimi

The geo-secure system: a secure system for data access based on geographical data , Fawaz J. Alruwaili

Heartbeat location assistance for electrocardiograms , Sarah Bass

Indirect association rule mining for crime data analysis , Riley Englin

Modeling and rendering of fluid flows using the Lennard-Jones potential , Nicholas J. LeFave

Multi-drug association rule mining on graphics processing unit , Jesse Scholer

Theses/Dissertations from 2014 2014

A study of kNN using ICU multivariate time series data , Admir Djulovic

Artificial Frequency Match Neuron Implemented with Digital Logic , David J. Ellis

Bridging the detection gap: a study on a behavior-based approach using malware techniques , Geancarlo Palavicini

3D Image Acquisition System for Facial Recognition , James E. Pearson

Divide and Conquer G-Buffer Ray Tracing , Daniel Stokes

Improving the performance of skeletal mesh animations in the Blender game engine , Mitchell Stokes

MINING MULTI-GRANULAR MULTIVARIATE MEDICAL MEASUREMENTS , Conrad Sykes

Theses/Dissertations from 2013 2013

Alsafeer software for teaching computer literacy , Zieb Rabie Alqahtani

Wireless electronic scoring of kendo competition matches using an embedded system , Edward B. Hogan

Using phishing to test social engineering awareness of financial employees , Rebecca M. Long

GPU ray tracing with CUDA , Thomas A. Pitkin

Ray traced rendering using GPGPU devices , Coby Soss

Theses/Dissertations from 2012 2012

Windows security sandbox framework , Kyle P. Gwinnup

Micro unmanned aerial vehicle video surveillance platform quadrocopter aircraft , Michael John Skadan

WiFiPoz -- an accurate indoor positioning system , Xiaoyi Ye

SSVEP-based brain computer interface using the Emotiv EPOC , Brian J. Zier

Theses/Dissertations from 2010 2010

Bittorrent vulnerable to layer-7 packet injection , Stephen L. Heath

Masquerade detection using fortified naive Bayes , Eric Salsbury

Theses/Dissertations from 2009 2009

Raising security awareness among higher education recipients , Chun-I Lin

On refactoring , Kaleb P. Pederson

Word prediction in assistive technologies for Aphasia rehabilitation in using Systemic Functional Grammar , Christopher T. Sorna

Novel visualization scheme for reasoning with uncertainty , Kyle A. Springer

Theses/Dissertations from 2008 2008

Tor latency attach verification and analysis , Ronnie Hoeflin

GPU programming: developing realistic water effects with OpenGL and GLSL , Joshua G. Slider

Theses/Dissertations from 2006 2006

Visualization of logic programming , Michael D. Henry

Theses/Dissertations from 2005 2005

Construction of efficient indexes from Fuzzy Clusters: preliminary study , Sean M. Drexler

Navigation agents and traffic simulation , Bart Hunking

Web-based fuzzy expert system: EWU optimal advisor , Nasser A. Rafi

Theses/Dissertations from 2003 2003

Intrusion detection, intelligent agents, and soft computing , Patrick Miller

Source code security analysis and fuzzy logic , Alexander Moskalyuk

Theses/Dissertations from 2002 2002

Support vector machines, N-gram kernels, and text classification , John Mill

Theses/Dissertations from 2001 2001

Solid object model advanced operations , Robert L. Throop

Theses/Dissertations from 2000 2000

Interactive 3D model display in Java 3D , Keqiu Chen

Theses/Dissertations from 1998 1998

Subdivision, and rfefinement of non-uniform rational B-spline curves and surfaces in 3-D , Bill E. La Rue

Theses/Dissertations from 1995 1995

A transputer based prototype for a fuzzy logic controller with tuning and simulation capabilities , Marshall Ryan Weddle

Theses/Dissertations from 1994 1994

Visualizing medical data using direct volume rendering , Bryce R. Hein

Industrial control via a state language implementation on the transputer architecture , Ted Preston VanderWeyst

A cellular method for modeling solid features in volume data , Jeff Wolkenhauer

Theses/Dissertations from 1993 1993

Hybrid coding with enhanced RDC and Huffman compression algorithms , Wilhelm J. Jenner

Implementation of a digital control system analysis program using the z-transform , Kristine L. Rudin

Subtyping and inheritance in a metamodel of abstractions , Gavin Vess

Theses/Dissertations from 1992 1992

Left ventricular boundary detection in digitized cardiac images , Albertine L. Marie Alm

High level user interface for a parallel operating system , Terry Conkright

Hybrid dictionary/statistical text compression algorithms , Michael E. Piotrowski

A study of using backpropagation and a new neural net algorithm for edge detecting in binary images , Jun Tian

Theses/Dissertations from 1990 1990

Visual parallel programming via petri nets , David Glenn Passey

Theses/Dissertations from 1988 1988

An iconic approach to parallel design , Elizabeth Stevens

Theses/Dissertations from 1986 1986

Conversion form structured programming to an object-oriented programming structure , Daryl Edward Krauter

Advanced Search

  • Notify me via email or RSS
  • Colleges, Departments, and Programs
  • Disciplines

Author Corner

  • EWU Libraries
  • Contact EWU Libraries

509.359.7888 | Email

Home | About | FAQ | My Account | Contact | Accessibility | EWU Libraries | EWU Home

Privacy Copyright

ScholarWorks

Home > Engineering > Computer Science > Computer Science Graduate Projects

Computer Science Graduate Projects and Theses

Theses/dissertations from 2023 2023.

High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal

Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan

Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah

Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker

Fake News Detection Using Narrative Content and Discourse , Hongmin Kim

Anomaly Detection Using Graph Neural Network , Bishal Lakha

Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola

Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George

Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten

Theses/Dissertations from 2022 2022

Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck

Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones

Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi

Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee

Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn

Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy

Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane

Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda

Hate Speech Detection Using Textual and User Features , Rohan Raut

Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib

Characterization and Mitigation of False Information on the Web , Anu Shrestha

Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez

Theses/Dissertations from 2021 2021

Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen

Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar

Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green

Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz

Modeling Real and Fake News Sharing in Social Networks , Abishai Joy

Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy

Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton

Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts

A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar

Actors for the Internet of Things , Arjun Shukla

Theses/Dissertations from 2020 2020

Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black

Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke

Polyhedral+Dataflow Graphs , Eddie C. Davis

Improving Spellchecking for Children: Correction and Design , Brody Downs

A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake

Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung

Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi

Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi

Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill

Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin

Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli

A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips

Theses/Dissertations from 2019 2019

Edge-Assisted Workload-Aware Image Processing System , Anil Acharya

MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick

Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman

Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas

A Hybrid Model to Detect Fake News , Indhumathi Gurunathan

Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris

UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani

Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh

Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar

Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan

Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo

Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury

Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya

BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran

FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota

Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader

Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla

Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian

Theses/Dissertations from 2018 2018

Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya

Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah

Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri

Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour

Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha

Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton

Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira

Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa

Theses/Dissertations from 2017 2017

Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella

Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli

CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly

Predicting Friendship Strength in Facebook , Nitish Dhakal

Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi

Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley

Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala

Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes

A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal

Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki

Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li

The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship

Towards Automatic Repair of XACML Policies , Shuai Peng

Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma

Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez

Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright

Theses/Dissertations from 2016 2016

Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.

When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic

Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh

Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt

Towards Multipurpose Readability Assessment , Ion Madrazo

Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson

CEST: City Event Summarization using Twitter , Deepa Mallela

Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami

Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas

Massively Parallel Algorithm for Solving the Eikonal Equation on Multiple Accelerator Platforms , Anup Shrestha

A Certificateless One-Way Group Key Agreement Protocol for Point-to-Point Email Encryption , Srisarguru Sridhar

Dynamic Machine Level Resource Allocation to Improve Tasking Performance Across Multiple Processes , Richard Walter Thatcher

Theses/Dissertations from 2015 2015

Developing an Application for Evolutionary Search for Computational Models of Cellular Development , Nicolas Scott Cornia

Accelerated Radar Signal Processing in Large Geophysical Datasets , Ravi Preesha Geetha

Integrity Coded Databases (ICDB) – Protecting Integrity for Outsourced Databases , Archana Nanjundarao

  • Collections
  • Disciplines
  • SelectedWorks Gallery
  • Albertsons Library
  • Division of Research
  • Graduate College

Advanced Search

  • Notify me via email or RSS

Author Corner

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Home > FACULTIES > Computer Science > CSD-ETD

Computer Science Department

Computer Science Theses and Dissertations

This collection contains theses and dissertations from the Department of Computer Science, collected from the Scholarship@Western Electronic Thesis and Dissertation Repository

Theses/Dissertations from 2024 2024

A Target-Based and A Targetless Extrinsic Calibration Methods for Thermal Camera and 3D LiDAR , Farhad Dalirani

Investigating Tree- and Graph-based Neural Networks for Natural Language Processing Applications , Sudipta Singha Roy

Theses/Dissertations from 2023 2023

Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis , Amreen Anbar

Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces , Sepehr Asgarian

Improved Protein Sequence Alignments Using Deep Learning , Seyed Sepehr Ashrafzadeh

INVESTIGATING IMPROVEMENTS TO MESH INDEXING , Anurag Bhattacharjee

Algorithms and Software for Oligonucleotide Design , Qin Dong

Framework for Assessing Information System Security Posture Risks , Syed Waqas Hamdani

De novo sequencing of multiple tandem mass spectra of peptide containing SILAC labeling , Fang Han

Local Model Agnostic XAI Methodologies Applied to Breast Cancer Malignancy Predictions , Heather Hartley

A Quantitative Analysis Between Software Quality Posture and Bug-fixing Commit , Rongji He

A Novel Method for Assessment of Batch Effect on single cell RNA sequencing data , Behnam Jabbarizadeh

Dynamically Finding Optimal Kernel Launch Parameters for CUDA Programs , Taabish Jeshani

Citation Polarity Identification From Scientific Articles Using Deep Learning Methods , Souvik Kundu

Denoising-Based Domain Adaptation Network for EEG Source Imaging , Runze Li

Decoy-Target Database Strategy and False Discovery Rate Analysis for Glycan Identification , Xiaoou Li

DpNovo: A DEEP LEARNING MODEL COMBINED WITH DYNAMIC PROGRAMMING FOR DE NOVO PEPTIDE SEQUENCING , Yizhou Li

Developing A Smart Home Surveillance System Using Autonomous Drones , Chongju Mai

Look-Ahead Selective Plasticity for Continual Learning , Rouzbeh Meshkinnejad

The Two Visual Processing Streams Through The Lens Of Deep Neural Networks , Aidasadat Mirebrahimi Tafreshi

Source-free Domain Adaptation for Sleep Stage Classification , Yasmin Niknam

Data Heterogeneity and Its Implications for Fairness , Ghazaleh Noroozi

Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System for Efficient, Sustainable, and Self-Adaptive Urban Environments , Elham Okhovat

Evaluating the Likelihood of Bug Inducing Commits Using Metrics Trend Analysis , Parul Parul

On Computing Optimal Repairs for Conditional Independence , Alireza Pirhadi

Open-Set Source-Free Domain Adaptation in Fundus Images Analysis , Masoud Pourreza

Migration in Edge Computing , Arshin Rezazadeh

A Modified Hopfield Network for the K-Median Problem , Cody Rossiter

Predicting Network Failures with AI Techniques , Chandrika Saha

Toward Building an Intelligent and Secure Network: An Internet Traffic Forecasting Perspective , Sajal Saha

An Exploration of Visual Analytic Techniques for XAI: Applications in Clinical Decision Support , Mozhgan Salimiparsa

Attention-based Multi-Source-Free Domain Adaptation for EEG Emotion Recognition , Amir Hesam Salimnia

Global Cyber Attack Forecast using AI Techniques , Nusrat Kabir Samia

IMPLEMENTATION OF A PRE-ASSESSMENT MODULE TO IMPROVE THE INITIAL PLAYER EXPERIENCE USING PREVIOUS GAMING INFORMATION , Rafael David Segistan Canizales

A Computational Framework For Identifying Relevant Cell Types And Specific Regulatory Mechanisms In Schizophrenia Using Data Integration Methods , Kayvan Shabani

Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network , Sareh Soltani Nejad

Smartphone Loss Prevention System Using BLE and GPS Technology , Noshin Tasnim

A Hybrid Continual Machine Learning Model for Efficient Hierarchical Classification of Domain-Specific Text in The Presence of Class Overlap (Case Study: IT Support Tickets) , Yasmen M. Wahba

Reducing Negative Transfer of Random Data in Source-Free Unsupervised Domain Adaptation , Anthony Wong

Deep Neural Methods for True/Pseudo- Invasion Classification in Colorectal Polyp Whole-Slide Images , Zhiyuan Yang

Developing a Relay-based Autonomous Drone Delivery System , Muhammad Zakar

Learning Mortality Risk for COVID-19 Using Machine Learning and Statistical Methods , Shaoshi Zhang

Machine Learning Techniques for Improved Functional Brain Parcellation , Da Zhi

Theses/Dissertations from 2022 2022

The Design and Implementation of a High-Performance Polynomial System Solver , Alexander Brandt

Defining Service Level Agreements in Serverless Computing , Mohamed Elsakhawy

Algorithms for Regular Chains of Dimension One , Juan P. Gonzalez Trochez

Towards a Novel and Intelligent e-commerce Framework for Smart-Shopping Applications , Susmitha Hanumanthu

Multi-Device Data Analysis for Fault Localization in Electrical Distribution Grids , Jacob D L Hunte

Towards Parking Lot Occupancy Assessment Using Aerial Imagery and Computer Vision , John Jewell

Potential of Vision Transformers for Advanced Driver-Assistance Systems: An Evaluative Approach , Andrew Katoch

Psychological Understanding of Textual journals using Natural Language Processing approaches , Amirmohammad Kazemeinizadeh

Driver Behavior Analysis Based on Real On-Road Driving Data in the Design of Advanced Driving Assistance Systems , Nima Khairdoost

Solving Challenges in Deep Unsupervised Methods for Anomaly Detection , Vahid Reza Khazaie

Developing an Efficient Real-Time Terrestrial Infrastructure Inspection System Using Autonomous Drones and Deep Learning , Marlin Manka

Predictive Modelling For Topic Handling Of Natural Language Dialogue With Virtual Agents , Lareina Milambiling

Improving Deep Entity Resolution by Constraints , Soudeh Nilforoushan

Respiratory Pattern Analysis for COVID-19 Digital Screening Using AI Techniques , Annita Tahsin Priyoti

Extracting Microservice Dependencies Using Log Analysis , Andres O. Rodriguez Ishida

False Discovery Rate Analysis for Glycopeptide Identification , Shun Saito

Towards a Generalization of Fulton's Intersection Multiplicity Algorithm , Ryan Sandford

An Investigation Into Time Gazed At Traffic Objects By Drivers , Kolby R. Sarson

Exploring Artificial Intelligence (AI) Techniques for Forecasting Network Traffic: Network QoS and Security Perspectives , Ibrahim Mohammed Sayem

A Unified Representation and Deep Learning Architecture for Persuasive Essays in English , Muhammad Tawsif Sazid

Towards the development of a cost-effective Image-Sensing-Smart-Parking Systems (ISenSmaP) , Aakriti Sharma

Advances in the Automatic Detection of Optimization Opportunities in Computer Programs , Delaram Talaashrafi

Reputation-Based Trust Assessment of Transacting Service Components , Konstantinos Tsiounis

Fully Autonomous UAV Exploration in Confined and Connectionless Environments , Kirk P. Vander Ploeg

Three Contributions to the Theory and Practice of Optimizing Compilers , Linxiao Wang

Developing Intelligent Routing Algorithm over SDN: Reusable Reinforcement Learning Approach , Wumian Wang

Predicting and Modifying Memorability of Images , Mohammad Younesi

Theses/Dissertations from 2021 2021

Generating Effective Sentence Representations: Deep Learning and Reinforcement Learning Approaches , Mahtab Ahmed

A Physical Layer Framework for a Smart City Using Accumulative Bayesian Machine Learning , Razan E. AlFar

Load Balancing and Resource Allocation in Smart Cities using Reinforcement Learning , Aseel AlOrbani

Contrastive Learning of Auditory Representations , Haider Al-Tahan

Cache-Friendly, Modular and Parallel Schemes For Computing Subresultant Chains , Mohammadali Asadi

Protein Interaction Sites Prediction using Deep Learning , Sourajit Basak

Predicting Stock Market Sector Sentiment Through News Article Based Textual Analysis , William A. Beldman

Improving Reader Motivation with Machine Learning , Tanner A. Bohn

A Black-box Approach for Containerized Microservice Monitoring in Fog Computing , Shi Chang

Visualization and Interpretation of Protein Interactions , Dipanjan Chatterjee

A Framework for Characterising Performance in Multi-Class Classification Problems with Applications in Cancer Single Cell RNA Sequencing , Erik R. Christensen

Exploratory Search with Archetype-based Language Models , Brent D. Davis

Evolutionary Design of Search and Triage Interfaces for Large Document Sets , Jonathan A. Demelo

Building Effective Network Security Frameworks using Deep Transfer Learning Techniques , Harsh Dhillon

A Deep Topical N-gram Model and Topic Discovery on COVID-19 News and Research Manuscripts , Yuan Du

Automatic extraction of requirements-related information from regulatory documents cited in the project contract , Sara Fotouhi

Developing a Resource and Energy Efficient Real-time Delivery Scheduling Framework for a Network of Autonomous Drones , Gopi Gugan

A Visual Analytics System for Rapid Sensemaking of Scientific Documents , Amirreza Haghverdiloo Barzegar

Calibration Between Eye Tracker and Stereoscopic Vision System Employing a Linear Closed-Form Perspective-n-Point (PNP) Algorithm , Mohammad Karami

Fuzzy and Probabilistic Rule-Based Approaches to Identify Fault Prone Files , Piyush Kumar Korlepara

Parallel Arbitrary-precision Integer Arithmetic , Davood Mohajerani

A Technique for Evaluating the Health Status of a Software Module Using Process Metrics , . Ria

Visual Analytics for Performing Complex Tasks with Electronic Health Records , Neda Rostamzadeh

Predictive Model of Driver's Eye Fixation for Maneuver Prediction in the Design of Advanced Driving Assistance Systems , Mohsen Shirpour

A Generative-Discriminative Approach to Human Brain Mapping , Deepanshu Wadhwa

WesternAccelerator:Rapid Development of Microservices , Haoran Wei

A Lightweight and Explainable Citation Recommendation System , Juncheng Yin

Mitosis Detection from Pathology Images , Jinhang Zhang

Theses/Dissertations from 2020 2020

Visual Analytics of Electronic Health Records with a focus on Acute Kidney Injury , Sheikh S. Abdullah

Towards the Development of Network Service Cost Modeling-An ISP Perspective , Yasmeen Ali

  • Accessible Formats

Advanced Search

  • Notify me via email or RSS
  • Expert Gallery
  • Online Journals
  • eBook Collections
  • Reports and Working Papers
  • Conferences and Symposiums
  • Electronic Theses and Dissertations
  • Digitized Special Collections
  • All Collections
  • Disciplines

Author Corner

  • Submit Thesis/Dissertation

Home | About | FAQ | My Account | Accessibility Statement | Privacy | Copyright

©1878 - 2016 Western University

Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations

Computer Science and Engineering Theses and Dissertations

Theses/dissertations from 2023 2023.

Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno

Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan

Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros

Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin

Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen

Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur

A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.

Graph Analysis on Social Networks , Shen Lu

Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera

Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo

Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi

Theses/Dissertations from 2022 2022

Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed

Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala

Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen

A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave

On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou

Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang

A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri

Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney

Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin

Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker

Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich

Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar

Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong

Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward

Theses/Dissertations from 2021 2021

Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar

Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia

Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto

Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis

Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey

AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi

Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill

Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja

Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana

Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev

Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.

Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski

Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov

Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai

Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri

Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco

Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam

Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava

A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza

Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar

Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams

Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari

Theses/Dissertations from 2020 2020

Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal

Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari

Composition of Atomic-Obligation Security Policies , Yan Cao Albright

Action Recognition Using the Motion Taxonomy , Maxat Alibayev

Sentiment Analysis in Peer Review , Zachariah J. Beasley

Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov

Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang

Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram

PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami

Composition of Atomic-Obligation Security Policies , Danielle Ferguson

Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel

The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez

Privacy-Preserving and Functional Information Systems , Thang Hoang

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January

Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi

Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam

Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha

Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath

System Support of Concurrent Database Query Processing on a GPU , Hao Li

Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu

Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li

Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla

Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng

Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi

Models of Secure Software Enforcement and Development , Hernan M. Palombo

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul

Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan

Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah

Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui

Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon

Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna

Theses/Dissertations from 2019 2019

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur

Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed

Phenomena of Social Dynamics in Online Games , Essa Alhazmi

A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri

Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari

Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee

A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao

Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin

Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano

Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang

A GPU-Based Framework for Parallel Spatial Indexing and Query Processing , Zhila Nouri Lewis

A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic , Trisha Mukhopadhyay

An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks , Srivarsha Polnati

Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain , John Rippetoe

Detecting Digitally Forged Faces in Online Videos , Neilesh Sambhu

Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses , Dakun Shen

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

  • Northeastern University
  • Khoury College of Computer Science
  • Computer and Information Science Theses and Dissertations
  • Computer Science Master's Theses

Computer Science Master's Theses Collection

http://hdl.handle.net/2047/D20233315

aBBRate: automating BBR congestion control attack exploration using a model-based approach.

Analysis of named entity recognition & entity linking in historical text

Annotating decision analyses using semantic web technologies

Applying EM to compute document relevance from crowdsourced pair preferences

Applying unsupervised grammar induction to OCR error correction

Argument mining for understanding media bias and misinformation

ARID: affinity representing instance descriptors.

Automated explanation of research informed consent by embodied conversational agents

Automated indexing of stories for conversational health intervention

Bias measurement in small datasets

University of Regina Logo

  • Emergency Info
  • Directories
  • UR Self-Service
  • Academic Calendars & Schedules

master thesis computer science example

  • Find a Person
  • Search Classes & Build Schedule
  • Future Grad Students
  • Professional Programs
  • MSc (Thesis Route)
  • MSc (Project Route)
  • MSc (Data Science)
  • MSc (Human-Centred Computing)
  • MSc (Course Route)
  • Thesis Approval & Defence Procedures
  • FGSR Regulations
  • Course Descriptions
  • Most Recent Course Syllabi
  • Course Timetable
  • Financial Support
  • Graduate Program FAQ

Banner Image

  • Undergraduate
  • Classes & Labs

Thesis Examples

Latex Example (shortened M.Sc. with urthesis.sty)  (ZIP)

Latex Example (complete M.Sc. with no .sty)  (ZIP)

How to Write a M.Sc. Thesis

The following guide to writing an M.Sc. thesis was prepared by Howard Hamilton and Brien Maguire, based on previous guides by Alan Mackworth (University of British Columbia) and Nick Cercone (Simon Fraser University), with their permission.

Quick Guide to the M.Sc. Thesis

An acceptable M.Sc. thesis in Computer Science should attempt to satisfy one or more of the following criteria:

  • Original research results are explained clearly and concisely.
  • The thesis explains a novel exploratory implementation or a novel empirical study whose results will be of interest to the Computer Science community in general and to a portion of the Computer Science community in particular, e.g., Artificial Intelligence, Computational Complexity, etc.
  • Novel implementation techniques are outlined, generalized, and explained.
  • Theoretical results are obtained, explained, proven, and (worst, best, average) case analysis is performed where applicable.
  • The implementation of a practical piece of nontrivial software whose availability could have some impact on the Computer Science community. Examples are a distributed file system for a mobile computing environment and a program featuring the application of artificial intelligence knowledge representation and planning techniques to intelligent computer assisted learning software.

Writing an acceptable thesis can be a painful and arduous task, especially if you have not written much before. A good methodology to follow, immediately upon completion of the required courses, is to keep a paper or electronic research notebook and commit to writing research oriented notes in it every day. From time to time, organize or reorganize your notes under headings that capture important categories of your thoughts. This journal of your research activities can serve as a very rough draft of your thesis by the time you complete your research. From these notes to a first M.Sc. thesis draft is a much less painful experience than to start a draft from scratch many months after your initial investigations. To help structure an M.Sc. thesis, the following guide may help.

One Formula for an M.Sc. Thesis for Computer Science

Chapter 1 Introduction: This chapter contains a discussion of the general area of research which you plan to explore in the thesis. It should contain a summary of the work you propose to carry out and the motivations you can cite for performing this work. Describe the general problem that you are working towards solving and the specific problem that you attempt to solve in the thesis. For example, the general problem may be finding an algorithm to help an artificial agent discover a path in a novel environment, and the specific problem may be evaluating the relative effectiveness and efficiency of five particular named approaches to finding the shortest path in a graph where each node is connected to at most four neighbours, with no knowledge of the graph except that obtained by exploration. This chapter should also explain the motivations for solving each of the general problem and your specific problem. The chapter should end with a guide to the reader on the composition and contents of the rest of the thesis, chapter by chapter. If there are various paths through the thesis, these should also be explained in Chapter 1.

Chapter 2 Limited Overview of the Field: This chapter contains a specialized overview of that part of a particular field in which you are doing M.Sc. thesis research, for example, paramodulation techniques for automated theorem proving or bubble figure modelling strategies for animation systems. The survey should not be an exhaustive survey but rather should impose some structure on your field of research endeavour and carve out your niche within the structure you impose. You should make generous use of illustrative examples and citations to current research.

Chapter 3 My Theory/Solution/Algorithm/Program: This chapter outlines your proposed solution to the specific problem described in Chapter 1. The solution may be an extension to, an improvement of, or even a disproof of someone else's theory / solution / method / ...).

Chapter 4 Description of Implementation or Formalism: This chapter describes your implementation or formalism. Depending on its length, it may be combined with Chapter 3. Not every thesis requires an implementation. Prototypical implementations are common and quite often acceptable although the guiding criterion is that the research problem must be clearer when you've completed your task than it was when you started!

Chapter 5 Results and Evaluation: This chapter should present the results of your thesis. You should choose criteria by which to judge your results, for example, the adequacy, coverage, efficiency, productiveness, effectiveness, elegance, user friendliness, etc., and then clearly, honestly and fairly adjudicate your results according to fair measures and report those results. You should repeat, whenever possible, these tests against competing or previous approaches (if you are clever you will win hands down in such comparisons or such comparisons will be obviated by system differences). The competing or previous approaches you compare against must have been introduced in Chapter 2 (in fact that may be the only reason they actively appear in Chapter 2) and you should include pointers back to Chapter 2. Be honest in your evaluations. If you give other approaches the benefit of the doubt every time, and develop a superior technique, your results will be all the more impressive.

Chapter 6 Conclusions: This chapter should summarize the achievements of your thesis and discuss their impact on the research questions you raised in Chapter 1. Use the distinctive phrasing "An original contribution of this thesis is" to identify your original contributions to research. If you solved the specific problem described in Chapter 1, you should explicitly say so here. If you did not, you should also make this clear. You should indicate open issues and directions for further or future work in this area with your estimates of relevance to the field, importance and amount of work required.

References Complete references for all cited works. This should not be a bibliography of everything you have read in your area.

Appendices include technical material (program listings, output, graphical plots of data, detailed tables of experimental results, detailed proofs, etc.) which would disrupt the flow of the thesis but should be made available to help explain or provide details to the curious reader.

  • Privacy & Terms of Use
  • Contact U of R
  • Campus Maps
  • U of R Home
  • For Faculty and Staff
  • City of Regina

SDSU

Department of Computer Science

  • Teaching Associates
  • Undergraduate Advisors
  • Graduate Advisors
  • Faculty Positions
  • Computer Sciences Advisory Board
  • Fall 2021 Old/New CS Major/Minor FAQs
  • Undergraduate Degree Information
  • Prospective Undergrads
  • 2021 CS Major Requirements
  • 2020 CS Major Requirements
  • 2021 CS Minor Requirements
  • 2020 CS Minor Requirements
  • M.S. in Computer Science
  • M.S. in Computer Science 2023
  • M.S. in Computer Science 2022
  • Applying to the Master’s in CS Program
  • Thesis Defense

Past Theses

  • Spring 2024 CS Master Exams Registration
  • Automata & Formal Languages
  • Data Structures & Algorithms
  • Database Management Systems
  • Intelligent Systems & Robotics
  • Operating Systems & Architecture
  • Programming Languages
  • Applying to the Program
  • Registering for Classes
  • GIS Certificate
  • Laboratories
  • CS Undergraduate Advising
  • Sciences Advising
  • Financial Aid & Scholarships
  • Scholarship Finder
  • Graduate Studies
  • Student Ability Center
  • Student Support Programs
  • Study Abroad
  • Health Resources
  • Counseling & Psychological Services
  • Employee Resources
  • Technical Services
  • Job Possibilities for CS Majors
  • Career Development
  • Clubs & Organizations
  • Cultural Centers
  • Student Council
  • ACM Chapter
  • Cyber Defense Team
  • Mechatronics Club
  • Give to the Department

Recent CS Masters Theses

The following is a list of some of the recently completed CS Masters Theses.

ScholarWorks@UMass Amherst

Home > CICS > CS > CS_DISS

Computer Science

Computer Science Department Dissertations Collection

Dissertations from 2024 2024.

Enabling Privacy and Trust in Edge AI Systems , Akanksha Atrey, Computer Science

Generative Language Models for Personalized Information Understanding , Pengshan Cai, Computer Science

Towards Automatic and Robust Variational Inference , Tomas Geffner, Computer Science

Multi-SLAM Systems for Fault-Tolerant Simultaneous Localization and Mapping , Samer Nashed, Computer Science

Policy Gradient Methods: Analysis, Misconceptions, and Improvements , Christopher P. Nota, Computer Science

Data to science with AI and human-in-the-loop , Gustavo Perez Sarabia, Computer Science

Question Answering By Case-Based Reasoning With Textual Evidence , Dung N. Thai, Computer Science

Dissertations from 2023 2023

An Introspective Approach for Competence-Aware Autonomy , Connor Basich, Computer Science

Foundations of Node Representation Learning , Sudhanshu Chanpuriya, Computer Science

Learning to See with Minimal Human Supervision , Zezhou Cheng, Computer Science

IMPROVING USER EXPERIENCE BY OPTIMIZING CLOUD SERVICES , Ishita Dasgupta, Computer Science

Automating the Formal Verification of Software , Emily First, Computer Science

Learning from Sequential User Data: Models and Sample-efficient Algorithms , Aritra Ghosh, Computer Science

Human-Centered Technologies for Inclusive Collection and Analysis of Public-Generated Data , Mahmood Jasim, Computer Science

Rigorous Experimentation For Reinforcement Learning , Scott M. Jordan, Computer Science

Towards Robust Long-form Text Generation Systems , Kalpesh Krishna, Computer Science

Emerging Trustworthiness Issues in Distributed Learning Systems , Hamid Mozaffari, Computer Science

TOWARDS RELIABLE CIRCUMVENTION OF INTERNET CENSORSHIP , Milad nasresfahani, Computer Science

Evidence Assisted Learning for Clinical Decision Support Systems , Bhanu Pratap Singh Rawat, Computer Science

DESIGN AND ANALYSIS OF CONTENT CACHING SYSTEMS , Anirudh Sabnis, Computer Science

Quantifying and Enhancing the Security of Federated Learning , Virat Vishnu Shejwalkar, Computer Science

Effective and Efficient Transfer Learning in the Era of Large Language Models , Tu Vu, Computer Science

Data-driven Modeling and Analytics for Greening the Energy Ecosystem , John Wamburu, Computer Science

Bayesian Structural Causal Inference with Probabilistic Programming , Sam A. Witty, Computer Science

LEARNING TO RIG CHARACTERS , Zhan Xu, Computer Science

GRAPH REPRESENTATION LEARNING WITH BOX EMBEDDINGS , Dongxu Zhang, Computer Science

Dissertations from 2022 2022

COMBINATORIAL ALGORITHMS FOR GRAPH DISCOVERY AND EXPERIMENTAL DESIGN , Raghavendra K. Addanki, Computer Science

MEASURING NETWORK INTERFERENCE AND MITIGATING IT WITH DNS ENCRYPTION , Seyed Arian Akhavan Niaki, Computer Science

Few-Shot Natural Language Processing by Meta-Learning Without Labeled Data , Trapit Bansal, Computer Science

Communicative Information Visualizations: How to make data more understandable by the general public , Alyxander Burns, Computer Science

REINFORCEMENT LEARNING FOR NON-STATIONARY PROBLEMS , Yash Chandak, Computer Science

Modeling the Multi-mode Distribution in Self-Supervised Language Models , Haw-Shiuan Chang, Computer Science

Nonparametric Contextual Reasoning for Question Answering over Large Knowledge Bases , Rajarshi Das, Computer Science

Languages and Compilers for Writing Efficient High-Performance Computing Applications , Abhinav Jangda, Computer Science

Controllable Neural Synthesis for Natural Images and Vector Art , Difan Liu, Computer Science

Probabilistic Commonsense Knowledge , Xiang Li, Computer Science

DISTRIBUTED LEARNING ALGORITHMS: COMMUNICATION EFFICIENCY AND ERROR RESILIENCE , Raj Kumar Maity, Computer Science

Practical Methods for High-Dimensional Data Publication with Differential Privacy , Ryan H. McKenna, Computer Science

Incremental Non-Greedy Clustering at Scale , Nicholas Monath, Computer Science

High-Quality Automatic Program Repair , Manish Motwani, Computer Science

Unobtrusive Assessment of Upper-Limb Motor Impairment Using Wearable Inertial Sensors , Brandon R. Oubre, Computer Science

Mixture Models in Machine Learning , Soumyabrata Pal, Computer Science

Decision Making with Limited Data , Kieu My Phan, Computer Science

Neural Approaches for Language-Agnostic Search and Recommendation , Hamed Rezanejad Asl Bonab, Computer Science

Low Resource Language Understanding in Voice Assistants , Subendhu Rongali, Computer Science

Enabling Daily Tracking of Individual’s Cognitive State With Eyewear , Soha Rostaminia, Computer Science

LABELED MODULES IN PROGRAMS THAT EVOLVE , Anil K. Saini, Computer Science

Reliable Decision-Making with Imprecise Models , Sandhya Saisubramanian, Computer Science

Data Scarcity in Event Analysis and Abusive Language Detection , Sheikh Muhammad Sarwar, Computer Science

Representation Learning for Shape Decomposition, By Shape Decomposition , Gopal Sharma, Computer Science

Metareasoning for Planning and Execution in Autonomous Systems , Justin Svegliato, Computer Science

Approximate Bayesian Deep Learning for Resource-Constrained Environments , Meet Prakash Vadera, Computer Science

ANSWER SIMILARITY GROUPING AND DIVERSIFICATION IN QUESTION ANSWERING SYSTEMS , Lakshmi Nair Vikraman, Computer Science

Dissertations from 2021 2021

Neural Approaches to Feedback in Information Retrieval , Keping Bi, Computer Science

Sociolinguistically Driven Approaches for Just Natural Language Processing , Su Lin Blodgett, Computer Science

Enabling Declarative and Scalable Prescriptive Analytics in Relational Data , Matteo Brucato, Computer Science

Neural Methods for Answer Passage Retrieval over Sparse Collections , Daniel Cohen, Computer Science

Utilizing Graph Structure for Machine Learning , Stefan Dernbach, Computer Science

Enhancing Usability and Explainability of Data Systems , Anna Fariha, Computer Science

Algorithms to Exploit Data Sparsity , Larkin H. Flodin, Computer Science

3D Shape Understanding and Generation , Matheus Gadelha, Computer Science

Robust Algorithms for Clustering with Applications to Data Integration , Sainyam Galhotra, Computer Science

Improving Evaluation Methods for Causal Modeling , Amanda Gentzel, Computer Science

SAFE AND PRACTICAL MACHINE LEARNING , Stephen J. Giguere, Computer Science

COMPACT REPRESENTATIONS OF UNCERTAINTY IN CLUSTERING , Craig Stuart Greenberg, Computer Science

Natural Language Processing for Lexical Corpus Analysis , Abram Kaufman Handler, Computer Science

Social Measurement and Causal Inference with Text , Katherine A. Keith, Computer Science

Concentration Inequalities in the Wild: Case Studies in Blockchain & Reinforcement Learning , A. Pinar Ozisik, Computer Science

Resource Allocation in Distributed Service Networks , Nitish Kumar Panigrahy, Computer Science

History Modeling for Conversational Information Retrieval , Chen Qu, Computer Science

Design and Implementation of Algorithms for Traffic Classification , Fatemeh Rezaei, Computer Science

SCALING DOWN THE ENERGY COST OF CONNECTING EVERYDAY OBJECTS TO THE INTERNET , Mohammad Rostami, Computer Science

Deep Learning Models for Irregularly Sampled and Incomplete Time Series , Satya Narayan Shukla, Computer Science

Traffic engineering in planet-scale cloud networks , Rachee Singh, Computer Science

Video Adaptation for High-Quality Content Delivery , Kevin Spiteri, Computer Science

Learning from Limited Labeled Data for Visual Recognition , Jong-Chyi Su, Computer Science

Human Mobility Monitoring using WiFi: Analysis, Modeling, and Applications , Amee Trivedi, Computer Science

Geometric Representation Learning , Luke Vilnis, Computer Science

Understanding of Visual Domains via the Lens of Natural Language , Chenyun Wu, Computer Science

Towards Practical Differentially Private Mechanism Design and Deployment , Dan Zhang, Computer Science

Audio-driven Character Animation , Yang Zhou, Computer Science

Dissertations from 2020 2020

Noise-Aware Inference for Differential Privacy , Garrett Bernstein, Computer Science

Motion Segmentation - Segmentation of Independently Moving Objects in Video , Pia Katalin Bideau, Computer Science

An Empirical Assessment of the Effectiveness of Deception for Cyber Defense , Kimberly J. Ferguson-Walter, Computer Science

Integrating Recognition and Decision Making to Close the Interaction Loop for Autonomous Systems , Richard Freedman, Computer Science

Improving Reinforcement Learning Techniques by Leveraging Prior Experience , Francisco M. Garcia, Computer Science

Optimization and Training of Generational Garbage Collectors , Nicholas Jacek, Computer Science

Understanding the Dynamic Visual World: From Motion to Semantics , Huaizu Jiang, Computer Science

Improving Face Clustering in Videos , SouYoung Jin, Computer Science

Reasoning About User Feedback Under Identity Uncertainty in Knowledge Base Construction , Ariel Kobren, Computer Science

Learning Latent Characteristics of Data and Models using Item Response Theory , John P. Lalor, Computer Science

Higher-Order Representations for Visual Recognition , Tsung-Yu Lin, Computer Science

Learning from Irregularly-Sampled Time Series , Steven Cheng-Xian Li, Computer Science

Dynamic Composition of Functions for Modular Learning , Clemens GB Rosenbaum, Computer Science

Improving Visual Recognition With Unlabeled Data , Aruni Roy Chowdhury, Computer Science

Deep Neural Networks for 3D Processing and High-Dimensional Filtering , Hang Su, Computer Science

Towards Optimized Traffic Provisioning and Adaptive Cache Management for Content Delivery , Aditya Sundarrajan, Computer Science

The Limits of Location Privacy in Mobile Devices , Keen Yuun Sung, Computer Science

ALGORITHMS FOR MASSIVE, EXPENSIVE, OR OTHERWISE INCONVENIENT GRAPHS , David Tench, Computer Science

System Design for Digital Experimentation and Explanation Generation , Emma Tosch, Computer Science

Advanced Search

  • Notify me via email or RSS
  • Collections
  • Disciplines

Author Corner

  • Login for Faculty Authors
  • Faculty Author Gallery
  • Expert Gallery
  • University Libraries
  • Computer Science Website
  • UMass Amherst

This page is sponsored by the University Libraries.

© 2009 University of Massachusetts Amherst • Site Policies

Privacy Copyright

Online Tesis

A list of master’s thesis topics in computer science

by Bastis Consultores | Aug 2, 2021 | Educational News | 1 comment

master thesis computer science example

Choosing a topic for your master’s thesis is a very important step. It all depends, to a large extent, on your interests and abilities. During your studies you have surely discovered the areas of computer science that you are good at and which of them you plan to improve in the future. Before you embark on a topic search, consider the following suggestions to help you craft an initial strategy.

Suggestions when choosing a Master’s Thesis topic

First of all, you have to choose a good supervisor or academic advisor. It is very important that you collaborate with a teacher whose interests match your topic; otherwise, you will benefit little from the writing process. Ask questions and find out if previous students were satisfied with their supervision.

Introduction to Computer Science Dissertations

A master’s degree in Information and Communications Technology is designed to meet the requirements of people working as different professionals, such as academics, administrators and managers, technical staff, trainers and developers in the private or public sectors. A master’s degree in computer science combines theory and educational practice to create a learning experience that allows for the development of skills that can be applied to complicated real-world problems.

The MSc in Computer Science aims to improve knowledge of how computer systems, software and applications, as well as other forms of communication technologies, can be used to drive economic growth, improve learning capacity, encourage greater communication and socialisation and generally improve living standards.

Thinking about the subfields of computer science that interest you

When looking for a thesis topic, don’t just focus on the defended works. Again, ask your teacher to give you a list of current topics in the field of computer science that are underdeveloped. Your professors have deep experience and are aware of all directions of research conducted in their areas of scientific interest. They can suggest a great idea and help you put it into practice. Here are some ideas:

Programme structure (old and new programme structures)

Computer security (privacy and openness)

Relationships between hardware and software (adaptation of hardware to software)

Complexity theory (computational problems, mathematical questions)

Algorithms and architectures (machine learning, hardware architectures)

Artificial intelligence (computer systems capable of recognizing speech and making decisions)

Bioinformatics (modelling of human body processes)

Databases and information retrieval (collection of information and creation of easy access to it)

Multimedia (creative technologies, animation, graphics, audio)

Computational linguistics (natural language processing, machine translation, speech recognition)

You can also work in the following fields, which have been very popular in the Master’s Theses of the Pontifical Catholic University of Peru

Image Processing

Data Mining

Cloud Computing

Network Security

Service Computing [ Web Service ]

Social sensor networks

Software-defined networking

Software reengineering

Telecommunications Engineering

Text mining

Pixel per inch

Ad hoc network

Ad hoc vehicle network

Video streaming

Visual cryptography

Soft computing

Wireless body area network

No cables [Redes inalámbricas]

Wireless sensor networks

Natural language processing

Audio, voice and language processing

Brain-computer interface

Reliable and secure computing

Information security and forensics

Internet Computing

Learning technologies

Systems and cybernetics

Context-aware computing

Mobile Cloud Computing

Consider the following list of ideas according to the latest theses defended at the Technological Institute of Costa Rica

New methodologies in the teaching of computer science.

Measurement methods and software management.

Management of business processes and data.

Detection of traps in online games: a behavioral approach.

Information security and cryptography.

Real-time systems.

Route planning for tourism applications.

Data mining for environmental problems.

Real-time traffic data to model the impact of traffic accidents on the road network.

Computer-aided educational process.

Security in cloud computing.

Optical character recognition.

Search and rescue robots: movement and trajectory planning.

Computational neurobiology.

Computer DNA analysis.

Examples of topic ideas for a Master’s Thesis in Computer Science project

Taking into consideration, the ideas presented above, here are the following examples:

A study to evaluate the challenges and benefits of using robotics in the offer of services.

Artificial intelligence is being used to develop automatic robotics, such as robots used in Japan to care for older adults. This study will evaluate the challenges and benefits associated with the use of robots in the provision of services.

Impact of virtual reality systems on product promotion

Virtual reality technology has made it possible to develop a 3D environment with which people can interact as if it were a physical environment. This study will examine how the introduction of virtual reality has led to the growth of product promotion. The research will also examine the benefits in terms of costs and how the technology can be adopted in a company for use in product promotion.

Improve mobile battery life and processing power through cloud computing

The battery life of mobile phones in many of the smartphones on the market today is between two and twelve hours. This has become a major setback for the use of mobile technology, especially in areas where there are no electrical connections. This study will assess how cloud computing technology could be used to improve the battery life of mobile phones, testing the processing power of smartphones.

Integration of natural language processing in Microsoft office.

Microsoft office is very popular for its efficient services, especially in writing. However, its use is limited to people who understand the use of computers and is limited in common languages. This study will examine how natural language processing could be used to integrate indigenous language into Microsoft’s office suite.

Use of big data analytics in the detection of irresponsible use of social networks

The innovation of big data analytics (BDA) has helped many companies process real-time data from multiple sources. This has made it possible to improve the decision-making procedure and monitoring processes. This study will examine how BDA could be used in a company to control irresponsible social media use.

Assessment of the effects of database security mechanisms on system performance

Security mechanisms are very important for any database because they help detect and prevent any form of cyberattack. However, some security mechanisms have overhead costs or performance issues that slow down service delivery. This study will examine how the security mechanisms of database systems affect the performance of systems.

Remember that computer science is widely used today in different fields. Its application ranges from physics and medicine to education and entertainment. You can focus on the theoretical part of a certain topic or present your ideas about the practical use of a specific program.

An overview of various business stimulation tools; assessment of its impact on student learning in tertiary business school

Information and communication technologies have greatly improved the efficiency of business processes, making the functions of the organization more effective. Multimedia advances have also provided stronger platforms for information sharing, socialization and entertainment. Business process designs and multimedia information systems are key research areas in information and communication technologies.

M-Government; benefits and outcomes of mobile government for connected societies

Multi-agent systems allow for a higher level of collaboration between multiple agents working together to achieve a common goal. Coinciding with advances in the field of artificial intelligence, multi-agent systems are moving towards a higher level of adaptability. Stimulation programs are also an important stream of intelligent computer programs that aim to work in highly complex scenarios.

Encouraging the use of e-commerce in Saudi Arabia in light of existing challenges

The growing power of the Internet, software as a service (SAAS) is a booming trend that opens up many new research opportunities.

Implications of cloud computing for the multimedia industry

With the advancement of information and communication technologies, security remains one of the biggest concerns and also an important field of research.

Interpretation of information systems security management

The security management of information systems is evaluated according to the business environment, the organizational culture, the expectations and obligations of the different roles, the meanings of the different actions and the related behavioral patterns. The results of the two case studies show that inadequate analysis, design and management of computer-based information systems affect the integrity and integrity of an organization. As a result, the likelihood of adverse events occurs increases. In such an environment, it is very likely that security measures will be ignored or inadequate for the real needs of an organization. Therefore, what is needed is consistency between computer-based information systems and the business environment in which they are integrated.

A framework for assessing the quality of customer information

This thesis addresses a widespread, significant and persistent problem in the practice of information systems: the lack of investment in the quality of information about customers. Many organizations need clear financial models to undertake investments in their information systems and related processes. However, there are no widely accepted approaches to rigorously articulate the costs and benefits of potential improvements in the quality of customer information. This can result in low-quality customer information that impacts the broader goals of the organization.

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Please enter an answer in digits: five × 1 =

Categories:

The most seen.

research work

Copy short link

master thesis computer science example

Master's Thesis in Computer Science

A Master's Thesis is expected to contain the following items:

  • Introduction and Motivation
  • Background of the Research Problem
  • Related Work (state of the art)
  • Problem Definition and Technical Solution
  • Evaluation of Developed Solution
  • Conclusions

In particular, the review of the state of the art should be thorough and the work performed should advance the state of the art.

Each Master's Thesis will be read and judged by a thesis committee consisting of the candidate's supervisor, a faculty member appointed by the supervisor, and a faculty member appointed by the Department through the GPD. The candidate is required to present a seminar on the thesis topic.

To register for MS Thesis (CS 699), the candidate must first obtain the approval of the GPD on the proposal.

Required Format

For more information on the format and procedure for completing the thesis, see ODU's Thesis & Dissertation Guide . Also see the guides under "Electronic Theses and Dissertations" at the Graduate School page .

Model Journal

Before you submit your thesis to ProQuest, the format must be approved by the College of Sciences . The College expects that you submit a "model journal" article along with your thesis. Your thesis format should match the journal for placement of table titles, placement of figure titles, and reference format. Your advisor may suggest a model journal, for example IEEE Transactions on Mobile Computing .

Recommended Deadlines

  • Submission of thesis to committee: six weeks prior to the last day of classes for the semester (must be at least two weeks before the defense)
  • MS thesis defense: four weeks prior to the deadline for college review
  • Include all required documents (see College of Sciences Thesis & Dissertation Review Procedures )
  • The College will follow-up with you about one week after submission
  • Any subsequent submissions to the College may be sent as PDF via email
  • Submission of approved thesis to ProQuest: see the official academic calendar for exact deadlines

Computer Science

  • Undergraduate
  • Linked Programs
  • Future Students
  • Scholarships & Financial Aid
  • Student Resources
  • Course Schedule

Department of Computer Science

3300 Engineering & Computational Sciences Building Norfolk, VA 23529

  • Frequently Asked Questions
  • Graduate Requirements
  • Graduate Advising
  • Graduate Forms
  • Graduate Scholarships
  • Join Computer Science Graduate Society
  • Alumni Updates

Enhance your college career by gaining relevant experience with the skills and knowledge needed for your future career. Discover our experiential learning opportunities.

Picture yourself in the classroom, speak with professors in your major, and meet current students.

From sports games to concerts and lectures, join the ODU community at a variety of campus events. 

  • My UCalgary
  • Class Schedule
  • UCalgary Directory
  • Continuing Education
  • Active Living
  • Academic Calendar
  • UCalgary Maps
  • Close Faculty Websites List Viewing: Faculty Websites
  • Cumming School of Medicine
  • Faculty of Arts
  • Faculty of Graduate Studies
  • Faculty of Kinesiology
  • Faculty of Law
  • Faculty of Nursing
  • Faculty of Nursing (Qatar)

Faculty of Science

  • Faculty of Social Work
  • Faculty of Veterinary Medicine
  • Haskayne School of Business
  • School of Architecture, Planning and Landscape
  • School of Public Policy
  • Schulich School of Engineering
  • Werklund School of Education
  • Future Students
  • Explore programs
  • How to apply
  • Understanding graduate studies
  • Indigenous graduate students
  • Financing grad school
  • International students
  • Graduate Student life
  • Current Students
  • Indigenous Graduate Students
  • Newly Admitted
  • Graduate Orientation
  • Pre-arrival
  • Registration
  • Annual Registration
  • Concurrent Registration
  • Flexible Grading Option (CG Grade)
  • Confirmation of registration
  • Course registration
  • Leave of absence
  • Registration status
  • Studying at another university
  • Updating personal information (included preferred name)
  • Thesis-based students

Fees and funding

  • Understanding your fees
  • Paying your fees
  • Funding options
  • Payment plan
  • Supervision
  • Best practices and guidelines
  • Conflict of interest
  • Changing supervision
  • Academic integrity
  • Annual progress report
  • Intellectual property
  • Building a thesis
  • Submit your thesis
  • Conducting oral exams remotely
  • Thesis defence
  • Course-based Students
  • Academic Integrity
  • Sources of funding
  • Payment Plan
  • NEW: Term-Based Registration
  • Completing my degree
  • Important dates and resources
  • Forms and documents
  • Graduate Calendar
  • Service Requests and eForms
  • News, updates and events
  • Find your Graduate Program Administrator
  • Calendar Archives
  • Award Opportunities
  • Graduate Awards Database
  • Award opportunities
  • Doctoral Recruitment Scholarships
  • Award Guide
  • Step 1: Applying
  • Looking for awards
  • Eligibility
  • Preparing your application
  • Step 2: Receiving
  • Accept/Decline your award
  • Getting paid
  • Step 3: Managing your award
  • Renewing your award
  • Award interruption
  • Award Termination
  • Policies and Regulations
  • Regulations
  • Contact the Scholarship Office
  • My GradSkills
  • Academic Success
  • My GradSkills Partners
  • Communication Skills
  • Research Communications Feedback Sessions
  • Oral communication
  • Visual communication
  • Written communication
  • Experiential Learning
  • Internships
  • For employers
  • For graduate students
  • Finding an internship
  • Making your internship a TTI
  • Applying for a TTI
  • For graduate supervisors
  • Images of Research
  • Three Minute Thesis
  • 2024 UCalgary 3MT Information
  • Past Three Minute Thesis Videos
  • Workshops and Resources
  • Career planning and professional development resources
  • My GradSkills Calendar
  • My GradSkills Workshop Matrix
  • Online/Virtual Training
  • UCalgary Alumni Mentorship Program
  • Exceptional scholars
  • Graduate Mental Health Survey
  • Test metrics
  • Demographics
  • Circumstances
  • Mental Health
  • What I wish I knew
  • FGS Services
  • Supervisory Renewal
  • Supports for graduate students
  • Graduate Academic and International Specialists
  • Graduate supervisors
  • Thesis and candidacy exams
  • Supervisor resources
  • Maintaining your supervisor profile
  • Supervisory privileges
  • Leadership team
  • FGS Council
  • Committees of Council
  • Minutes and meetings
  • Website Feedback

TDFL

Computer Science

Master of Science (MSc)

Thesis-based program

Program overview.

​The Computer Science program provides the bedrock for exciting careers at the forefront of innovation in private industry or entrepreneurship. It helps students build skills and novel ideas for designing and implementing software, as well as developing effective algorithms to solve computing problems and plan and manage organizational technology infrastructures. Cutting-edge companies such as Google, Apple, Amazon, Facebook, Autodesk, and Microsoft frequently hire graduates. Alumni are also actively engaged in entrepreneurship, innovation, and creating start-ups.

Completing this program

  • Core Course: Research Methodology in Computer Science.
  • Seminar: Students are required to give a departmental seminar on the results of their research.
  • Software Engineering Specialization: Four additional courses from a list approved by the Department of Computer Science.
  • Additional Courses: May include Artificial Intelligence, Databases, Computer Graphics, Scientific Computing, HCI and Visualization and others.
  • Thesis: Students will complete a thesis based on original research.

Specializations

  • Master of Science (MSc) Thesis-based in Computer Science, Software Engineering Specialization . The specialization is offered jointly through the Department of Computer Science and the Department of Electrical and Software Engineering.
  • Wearable Technology Interdisciplinary Specialization
  • Computational Neuroscience Interdisciplinary Specialization

Technology sector, business start-ups, computer science research, IT, software development.

A master’s degree in computer science will give you the pre-requisite for a PhD.

Students are required to prepare a thesis and successfully defend in an open oral defense.

One core course and four electives

Learn more about program requirements in the Academic Calendar

Classroom delivery

Time commitment.

Two years full-time

A supervisor is required, but is not required prior to the start of the program

See the Graduate Calendar for information on  fees and fee regulations,  and for information on  awards and financial assistance .

Virtual Tour

Explore the University of Calgary (UCalgary) from anywhere. Experience all that UCalgary has to offer for your graduate student journey without physically being on campus. Discover the buildings, student services and available programs all from your preferred device.

Supervisors

Learn about faculty available to supervise this degree. Please note: additional supervisors may be available. Contact the program for more information.

Placeholder Profile Image

John Aycock

Mario Costa Sousa

Mario Costa Sousa

Philip Fong

Philip Fong

Dr Marina Gavrilova

Dr. Marina Gavrilova

Majid Ghaderi

Majid Ghaderi

Image of Helen Ai He

Helen Ai He

Peter Høyer

Christian Jacob

Christian Jacob

Michael Jacobson Jr

Michael Jacobson, Jr.

Admission requirements

A minimum of 3.3 GPA on a 4.0 point system, over the past two years of full-time study (a minimum of 10 full-course equivalents or 60 units) of the undergraduate degree. Post-degree CS courses may be considered when calculating GPA. Exceptions to GPA requirement may be considered for those with either:

  • demonstrated research excellence, or
  • GRE General scores of at least 600 verbal and 750 quantitative and either 720 analytical (old test format) or 5.5 (new test format)

Minimum education

Four year degree in computer science or another field with 3rd or 4th year courses in the following areas: Theory of Computation; Software Engineering; Systems (OS, Compilers, Distributed Systems, Networking); Application (AI, Graphics, Databases, etc.).

Work samples

Reference letters.

Two letters of reference dated within twelve months of the application.

Test scores

Optional: Special consideration will be given to those with GRE scores of at least 600 verbal, 750 quantitative, and 720 analytical (5.5 in the new format). Applicants from outside Canada are expected to apply with GRE scores.

English language proficiency

An applicant whose primary language is not English may fulfill the English language proficiency requirement in one of the following ways:

  • Test of English as a Foreign Language (TOEFL ibt)  score of 97.
  • International English Language Testing System (IELTS)  score of 7.0 (minimum of 6.5 in each section).
  • Pearson Test of English (PTE)   score of 68, or higher (Academic version).
  • Canadian Academic English Language test (CAEL)  score of 70 (70 in some sections – up to the program, 60 in all other).  
  • Academic Communication Certificate (ACC)  score of A- in one or two courses (up to the program), “B+” on all other courses.  
  • Cambridge C1 Advanced or Cambridge C2 Proficiency  minimum score of 191.
  • Duolingo English Test  and obtaining a minimum score of 135* (with no sub-score below 115*). ( temporary until Fall 2024 intake ).

*Please contact your program of interest if you have any questions about ELP requirements

WINTER (For admission on January 1)

  • Final Application Deadline – July 1 (Final Documentation Submission Deadline – July 15 )
  • Final Application Deadline – September 1 (Final Documentation Submission Deadline – October 1 )

--------------

FALL (For admission on September 1)

  • Early Applications (complete application review) -  January 15
  • Final Application Deadline –  March 1  (Final Documentation Submission Deadline –  March 15 )
  • Final Application Deadline – May 1 (Final Documentation Submission Deadline – June 1 )

If you're not a Canadian or permanent resident, or if you have international credentials, make sure to learn about international requirements

Are you ready to apply?

Learn more about this program, department of computer science.

602 ICT Building 856 Campus Place NW Calgary, ABT2N 1N4 403.220.3528

Contact the Graduate Program Administrator

Visit the departmental website

University of Calgary 2500 University Drive NW Calgary, AB, T2N 1N4

Visit the Faculty of Science's website

Learn more about UCalgary by taking a virtual tour

Related programs

If you're interested in this program, you might want to explore other UCalgary programs.

Thesis-based PhD

Computational Media Design

Thesis-based MSc

Electrical and Software Engineering

Course-based MEng

Course-based MEng (Software)

Thesis-based MEng

Thesis-based MSc

Curious about the University of Calgary?

Located in the nation's most enterprising city, we are a living, growing and youthful institution that embraces change and opportunity with a can-do attitude.

master thesis computer science example

Master’s Thesis

Preliminary Note:  According to the Master regulations, the final paper in the Master program in Computer Science is the Master’s Thesis.

In a Master’s Thesis, candidates show their ability to independently perform scientific research on an appropriately challenging theme that also gives them the opportunity to develop their own ideas. On the basis of the "state-of-the-art" processes, the students must systematically apply the methods of computer science.

The Master’s Thesis must be written in the student's specialization area. The thesis advisor ensures that the objectives of the thesis can be reached within the intended time period. Advisors are available for consultation throughout the entire development of the thesis. They should regularly check that the work is progressing well and should also counteract any potentially negative developments, such as the student not meeting the objectives or exceeding the given time limit. They also give timely advice when the student is writing the thesis, and before the student submits the completed thesis.

All candidates must report the starting date of a Master’s Thesis to the Examination Office; the thesis topic and the starting date of the official processing period are then documented by the thesis advisor and forwarded to the Examination Office. The knowledge required for the thesis and how to acquire this knowledge should be clarified prior to when the topic is granted. For a Master’s Thesis, graduate students are first formally obliged to design a work plan. Approximately one month of full-time work (5 ECTS) is intended for this starting phase. The work plan (called a “Proposal”) must explore the thesis topic thoroughly enough and lay out a detailed plan for the following research on the thesis topic. The Proposal must explain this proposed research through detailed contents and depth as well as a complete depiction of the considered aspects. The Proposal must contain the following elements: a description of the task to be completed, the reasons behind working on the thesis, a clear formulation of the objectives, a description of the work necessary to reach the goal, and an accompanying timetable and preliminary outline of the written thesis. The work plan must be countersigned by the thesis advisor and submitted for approval to the Examination Office together with the application for the Master's Thesis. From this point on, the planned processing time is five months, whereas the start of the processing period agreed upon with the thesis advisor takes the one-month processing period for the work plan into account.

The written thesis is the main component of the final research. It should contain an incisive, understandable description of the completed research task, the research results, and the approach used to reach the result. In a thesis, candidates must also justify their decisions on which research methods or alternative solution approaches were used. The Master's Thesis must be written in the style of a scientific treatise. This includes in particular a summary, an outline, a description of the "state-of-the-art", and a bibliography of the literature used for the thesis. If software was designed and implemented during the thesis research, the structure, work methods and interfaces of the software must also be described precisely. Although it is not necessary to include the software documents in the written thesis, the software system, including the source code, must be available to the thesis advisor for review. Candidates must submit the written thesis in print to the examination office. Their advisor receives an additional copy in a common electronic format (PDF). 

The thesis defense, meaning an open-audience presentation followed by scientific discussion, is also an element of the Master’s Thesis. During the defense, the candidate must explain his/her research results concisely in a 30- to 45-minute presentation and then answer questions posed by a professional audience (usually during an advanced seminar held by the advisor). Ideally, the defense should be held soon after submission of the thesis.

To determine the grade granted for the thesis, the various achievements presented in the thesis are evaluated individually and internally. In general, the following individual achievements are divided into the categories listed below, arranged from the top down in order of the grade-relevant importance of the individual aspects.

Research Results . The results of the research work are given the highest priority and can come in various forms: theorems, software products, hardware products, empirically derived statements, or a mixture thereof. The approach employed to reach the results are also evaluated when the quality of the results are assessed.

Written Thesis. The written thesis, the main component of the research work, is given second priority. Here the evaluation includes determining how understandably graduates present the findings and research method to expert readers, and how well they concentrated on essential details and excluded non-essential details. The form, graphics, language and style of the thesis are also assessed.

Work method . The evaluation of the work method includes determining how purposefully and independently the candidate performed the research.

Presentation and discussion. Here, the committee evaluates the preparation of the presentation, the visual aids used for the presentation (such as slides), the candidates’ rhetorical skills and their ability to handle critical questions.

Due to the nature of the field of computer science, a Master’s Thesis that is written in cooperation with other institutes or (industrial) university-external parties is no rarity. And sometimes candidates write their thesis on a topic at an institute that corresponds to their minor subject. In both of these cases, the thesis advisor must inspect the research topic carefully and ensure that the candidate is given competent "on-site support". If the Master’s Thesis is written in a minor subject and an advisor in this minor subject takes on the role of the candidate’s supervisor, a university instructor in the Computer Science Department at the University of Paderborn must first determine that the research topic is plausible, and this instructor must supervise the thesis together with the advisor in the minor subject. Merely including the Computer Science Department advisor’s name as the secondary advisor when submitting the completed written thesis is not sufficient.

If the Master’s Thesis is written outside the university, such as at an external company, the thesis advisor must ensure that the candidate is not negatively affected by company-internal constraints (deadlines, financial dependence, non-disclosure agreements for concealing trade secrets). In this sense, “freedom of education” must be guaranteed. Companies are notified that the research work (the written thesis) is, by general rule, open to all readers. In special cases (such as when a patent is pending), a certain limited time period between the end of the research and the actual publication of the thesis can be determined. The in-company advisor/reviewer must make the entire research work available.

When submitting the thesis, candidates pledge to archive a public copy of the thesis for up to at least 5 years. The Computer Science Department, meaning the university in general, does not archive the submitted, accepted written thesis.

Guide Lines

  • Master's Thesis
  • Projectgroups

master thesis computer science example

  • Enroll & Pay
  • Prospective Students
  • Current Students
  • Degree Programs

Example MS Thesis Outline

  • describe what you trying to do
  • clearly state the question being addressed
  • when appropriate formulate a testable hypothesis
  • Describe the motivation; who is interested in the solution.
  • Summarize the results and their significance.
  • Describe current understanding of the problem, existing solutions, and the barriers to these solutions.
  • Review of the pertinent literature.
  • Methodology: Describe the approach to addressing the problem
  • Presentation of Work (Could be more than one chapter)
  • Summary of results
  • Recommendations: generalize conclusions to appropriate design decisions, practices and/or procedures
  • Implications to existing knowledge/theory
  • Implications for further study
  • Future Work
  • jump to content
  • jump to footer

Logo: Universität Stuttgart - zur Startseite

Theses in the Department of Computer Science

Here you can find important information about theses in the department of computer science. [Photo: Pixabay]

The final thesis (Bachelor or Master) should show that the student is able to work independently on a complex task related to the study program and present it in a scientifically correct manner. It does not necessarily have to be the last module in the degree program, but there are guidelines as to when it can be started at the earliest (see Planning the Thesis).

In our study programs, there is no requirement that the thesis must be registered no later than X months after the last module exam. Nevertheless, please note that the thesis must be completed AND graded by the end of the maximum study period at the latest.

How does everything work around the thesis?

Requirements for the search for a topic.

  • A thesis can only be started if at least 120 ECTS have been acquired in the Bachelor, and at least 60 ECTS in the Master. These ECTS must be entered on the transcript of records!
  • The examiner of a thesis MUST be a professor of the Department of Computer Science. The examiner issues the topic and gives the final grade for the thesis.
  • A second examiner (required for the master thesis) may come from another department / faculty of the University of Stuttgart.
  • Often you will be assigned a supervisor who will give you advice and support and whom you can ask anything about your thesis. The supervisor is generally a member of the examiner's staff.
  • It is possible to write a thesis in cooperation with a company. However, this is only possible if the examiner agrees. The company can at most take over the supervision, never the assignment of grades. However, since the orientation of the topics that come from companies often differs significantly from what is required as a thesis at the university, such constructs are very rare.

Finding a topic ...

To find a topic, it is best to contact the professors or their staff directly. Please make sure that you have taken courses from the department you are applying to. Otherwise, it may be difficult to work on a specific research topic of the department because you lack the prerequisites in this specific area. It may be a good start to take your own performance review and see what you particularly liked and where you also performed well on exams. These departments are then worth addressing first.

We try to post offers for theses as well as contact persons for the departments in ILIAS in the computer science marketplace.

If, after two to three months of intensive searching , you still have not found a topic, you can apply to the examination board for assignment of a thesis topic along with evidence of your unsuccessful search to date.

Registration of the thesis

It is important to note that you have to register your thesis with the Examinations Office no later than 1 month after starting the thesis (issue of the topic to you).

If a topic has been agreed upon, the secretary of the examiner prepares the computer science-specific contract including the license agreement (and, if applicable, confidentiality and/or language agreement) and hands out these documents to the student for proofreading. If possible, the time for proofreading and, if necessary, follow-up questions should not exceed one week. The contract documents are then signed by the student and returned to the secretary's office. If no publication is desired, the license agreement is crossed out. However, the document must remain with the contract.

At the same time, download the thesis application form from C@mpus. You can find it under the heading "My applications". If you are studying in the Master of Education, in the B.A. in Computer Science or in the B.A. minor in Computer Science, you will not receive this form from C@mpus, but directly from your exam officer. Please enter the following information in the form:

  • the topic of the thesis in the original language and in English,
  • the name of the examiner,
  • the start date,
  • sign the document and hand it in to the examiner's office.

The secretariat will have the document countersigned by the examiner and will then hand it back to you or send you a scan of it. You will then forward the document to the examination office as soon as possible. This can be done via the contact form and you can attach the scan or you can bring it personally to the examination office. There, the registration of the work will be entered into the system and confirmed on the form. Afterwards, please inform the examiner's office that the registration has been entered and that the work can now start. If the registration of the work is visible in the system (for the secretary's office), you will receive a copy of the contract.

By the way ...

  • Theses can be registered at any time (even outside the exam registration period).
  • In connection with the registration of the final thesis, the application for the issuance of the final documents must also be submitted. If you have any questions, please contact the examination office.

If you have any further questions, please contact the program manager or the examination board.

Submission of the thesis

The thesis must be printed and bound in the required number of copies (see contract). The following must be observed:

  • For all printed copies, a rigid transparent film should be used as the front cover and, if possible, a black, solid cover at the back.
  • The work must not be bound with a ring binding . Any type of adhesive or glue binding is permitted - preferably with a black linen booklet spine.
  • The form requirements are summarized here once again.

To ensure that everything is printed, bound and handed in on time, you should collect the required number of covers from the examiner's office approximately 14 days BEFORE handing in your thesis.

In addition to the print copies the followings things have to be submitted:

  • one separately printed title page of the thesis and
  • the electronic version (pdf) of the thesis and an electronic version of the abstract in txt format. If you are studying in a German-language program and the thesis was written in English, both an English and a German abstract must be submitted. The electronic files can be sent to the examiner and the secretary's office by e-mail, on a stick or on a CD. The code generated by the work, if any, will be handed over separately to the examiner.

All printed copies and the electronic version must be handed in to the examiner's office by the deadline . After the examination by the secretary's office, you will receive the separate title page signed and date-stamped as proof of submission.

Form specifications, templates & links

Here are once again summarized all the notes (in German only)

  • Instructions for examiners for the execution of theses
  • Instructions for students
  • Form specifications
  • Template title page
  • Template personal statetemt
  • Graduation ceremony of the department

What if problems occur?

You forgot the register the thesis.

Subsequent registration of the thesis is possible for a maximum of one month (from the date of topic assignment). After that, this is only possible upon application to the examination board and only if there are valid reasons for which you are not responsible. Otherwise, the thesis will not be evaluated and you will have to look for a new topic.

Aborting the thesis and second attempt

The topic of the thesis can be returned once within the first 2 months of the processing time (Bachelor thesis) or within the first 3 months of the processing time (Master thesis) without a 5.0 being recorded. After that, this is no longer possible and an abandonment leads to a "Not Passed".

The thesis can be repeated once. If you have returned the topic at the first attempt and received a new one, this is no longer possible at the second attempt.

There is no time limit within which the second attempt must be registered. However, the thesis must be passed within the maximum period of study.

In general ...

If problems arise during the processing period that prevent you from devoting yourself to your thesis in a targeted manner, please contact your examiner and the examination board as soon as possible.

Contact person concerning theses

This image shows Katrin Schneider

Katrin Schneider

Program Manager, Department Manager & Erasmus Coordinator of the Computer Science Department

  • Profile page
  • +49 711 685 88520
  • Write e-mail

master thesis computer science example

Universities Have a Computer-Science Problem

The case for teaching coders to speak French

Photo of college students working at their computers as part of a hackathon at Berkeley in 2018

Listen to this article

Produced by ElevenLabs and News Over Audio (NOA) using AI narration.

Updated at 5:37 p.m. ET on March 22, 2024

Last year, 18 percent of Stanford University seniors graduated with a degree in computer science, more than double the proportion of just a decade earlier. Over the same period at MIT, that rate went up from 23 percent to 42 percent . These increases are common everywhere: The average number of undergraduate CS majors at universities in the U.S. and Canada tripled in the decade after 2005, and it keeps growing . Students’ interest in CS is intellectual—culture moves through computation these days—but it is also professional. Young people hope to access the wealth, power, and influence of the technology sector.

That ambition has created both enormous administrative strain and a competition for prestige. At Washington University in St. Louis, where I serve on the faculty of the Computer Science & Engineering department, each semester brings another set of waitlists for enrollment in CS classes. On many campuses, students may choose to study computer science at any of several different academic outposts, strewn throughout various departments. At MIT, for example, they might get a degree in “Urban Studies and Planning With Computer Science” from the School of Architecture, or one in “Mathematics With Computer Science” from the School of Science, or they might choose from among four CS-related fields within the School of Engineering. This seepage of computing throughout the university has helped address students’ booming interest, but it also serves to bolster their demand.

Another approach has gained in popularity. Universities are consolidating the formal study of CS into a new administrative structure: the college of computing. MIT opened one in 2019. Cornell set one up in 2020. And just last year, UC Berkeley announced that its own would be that university’s first new college in more than half a century. The importance of this trend—its significance for the practice of education, and also of technology—must not be overlooked. Universities are conservative institutions, steeped in tradition. When they elevate computing to the status of a college, with departments and a budget, they are declaring it a higher-order domain of knowledge and practice, akin to law or engineering. That decision will inform a fundamental question: whether computing ought to be seen as a superfield that lords over all others, or just a servant of other domains, subordinated to their interests and control. This is, by no happenstance, also the basic question about computing in our society writ large.

When I was an undergraduate at the University of Southern California in the 1990s, students interested in computer science could choose between two different majors: one offered by the College of Letters, Arts and Sciences, and one from the School of Engineering. The two degrees were similar, but many students picked the latter because it didn’t require three semesters’ worth of study of a (human) language, such as French. I chose the former, because I like French.

An American university is organized like this, into divisions that are sometimes called colleges , and sometimes schools . These typically enjoy a good deal of independence to define their courses of study and requirements as well as research practices for their constituent disciplines. Included in this purview: whether a CS student really needs to learn French.

The positioning of computer science at USC was not uncommon at the time. The first academic departments of CS had arisen in the early 1960s, and they typically evolved in one of two ways: as an offshoot of electrical engineering (where transistors got their start), housed in a college of engineering; or as an offshoot of mathematics (where formal logic lived), housed in a college of the arts and sciences. At some universities, including USC, CS found its way into both places at once.

The contexts in which CS matured had an impact on its nature, values, and aspirations. Engineering schools are traditionally the venue for a family of professional disciplines, regulated with licensure requirements for practice. Civil engineers, mechanical engineers, nuclear engineers, and others are tasked to build infrastructure that humankind relies on, and they are expected to solve problems. The liberal-arts field of mathematics, by contrast, is concerned with theory and abstraction. The relationship between the theoretical computer scientists in mathematics and the applied ones in engineers is a little like the relationship between biologists and doctors, or physicists and bridge builders. Keeping applied and pure versions of a discipline separate allows each to focus on its expertise, but limits the degree to which one can learn from the other.

Read: Programmers, stop calling yourself engineers

By the time I arrived at USC, some universities had already started down a different path. In 1988, Carnegie Mellon University created what it says was one of the first dedicated schools of computer science. Georgia Institute of Technology followed two years later. “Computing was going to be a big deal,” says Charles Isbell, a former dean of Georgia Tech’s college of computing and now the provost at the University of Wisconsin-Madison. Emancipating the field from its prior home within the college of engineering gave it room to grow, he told me. Within a decade, Georgia Tech had used this structure to establish new research and teaching efforts in computer graphics, human-computer interaction, and robotics. (I spent 17 years on the faculty there, working for Isbell and his predecessors, and teaching computational media.)

Kavita Bala, Cornell University’s dean of computing, told me that the autonomy and scale of a college allows her to avoid jockeying for influence and resources. MIT’s computing dean, Daniel Huttenlocher, says that the speed at which computing evolves justifies the new structure.

But the computing industry isn’t just fast-moving. It’s also reckless. Technology tycoons say they need space for growth, and warn that too much oversight will stifle innovation. Yet we might all be better off, in certain ways, if their ambitions were held back even just a little. Instead of operating with a deep understanding or respect for law, policy, justice, health, or cohesion, tech firms tend to do whatever they want . Facebook sought growth at all costs, even if its take on connecting people tore society apart . If colleges of computing serve to isolate young, future tech professionals from any classrooms where they might imbibe another school’s culture and values—engineering’s studied prudence, for example, or the humanities’ focus on deliberation—this tendency might only worsen.

Read: The moral failure of computer scientists

When I raised this concern with Isbell, he said that the same reasoning could apply to any influential discipline, including medicine and business. He’s probably right, but that’s cold comfort. The mere fact that universities allow some other powerful fiefdoms to exist doesn’t make computing’s centralization less concerning. Isbell admitted that setting up colleges of computing “absolutely runs the risk” of empowering a generation of professionals who may already be disengaged from consequences to train the next one in their image. Inside a computing college, there may be fewer critics around who can slow down bad ideas. Disengagement might redouble. But he said that dedicated colleges could also have the opposite effect. A traditional CS department in a school of engineering would be populated entirely by computer scientists, while the faculty for a college of computing like the one he led at Georgia Tech might also house lawyers, ethnographers, psychologists, and even philosophers like me. Huttenlocher repeatedly emphasized that the role of the computing college is to foster collaboration between CS and other disciplines across the university. Bala told me that her college was established not to teach CS on its own but to incorporate policy, law, sociology, and other fields into its practice. “I think there are no downsides,” she said.

Mark Guzdial is a former faculty member in Georgia Tech’s computing college, and he now teaches computer science in the University of Michigan’s College of Engineering. At Michigan, CS wasn’t always housed in engineering—Guzdial says it started out inside the philosophy department, as part of the College of Literature, Science and the Arts. Now that college “wants it back,” as one administrator told Guzdial. Having been asked to start a program that teaches computing to liberal-arts students, Guzdial has a new perspective on these administrative structures. He learned that Michigan’s Computer Science and Engineering program and its faculty are “despised” by their counterparts in the humanities and social sciences. “They’re seen as arrogant, narrowly focused on machines rather than people, and unwilling to meet other programs’ needs,” he told me. “I had faculty refuse to talk to me because I was from CSE.”

In other words, there may be downsides just to placing CS within an engineering school, let alone making it an independent college. Left entirely to themselves, computer scientists can forget that computers are supposed to be tools that help people. Georgia Tech’s College of Computing worked “because the culture was always outward-looking. We sought to use computing to solve others’ problems,” Guzdial said. But that may have been a momentary success. Now, at Michigan, he is trying to rebuild computing education from scratch, for students in fields such as French and sociology. He wants them to understand it as a means of self-expression or achieving justice—and not just a way of making software, or money.

Early in my undergraduate career, I decided to abandon CS as a major. Even as an undergraduate, I already had a side job in what would become the internet industry, and computer science, as an academic field, felt theoretical and unnecessary. Reasoning that I could easily get a job as a computer professional no matter what it said on my degree, I decided to study other things while I had the chance.

I have a strong memory of processing the paperwork to drop my computer-science major in college, in favor of philosophy. I walked down a quiet, blue-tiled hallway of the engineering building. All the faculty doors were closed, although the click-click of mechanical keyboards could be heard behind many of them. I knocked on my adviser’s door; she opened it, silently signed my paperwork without inviting me in, and closed the door again. The keyboard tapping resumed.

The whole experience was a product of its time, when computer science was a field composed of oddball characters, working by themselves, and largely disconnected from what was happening in the world at large. Almost 30 years later, their projects have turned into the infrastructure of our daily lives. Want to find a job? That’s LinkedIn. Keep in touch? Gmail, or Instagram. Get news? A website like this one, we hope, but perhaps TikTok. My university uses a software service sold by a tech company to run its courses. Some things have been made easier with computing. Others have been changed to serve another end, like scaling up an online business.

Read: So much for ‘learn to code’

The struggle to figure out the best organizational structure for computing education is, in a way, a microcosm of the struggle under way in the computing sector at large. For decades, computers were tools used to accomplish tasks better and more efficiently. Then computing became the way we work and live. It became our culture, and we began doing what computers made possible, rather than using computers to solve problems defined outside their purview. Tech moguls became famous, wealthy, and powerful. So did CS academics (relatively speaking). The success of the latter—in terms of rising student enrollments, research output, and fundraising dollars—both sustains and justifies their growing influence on campus.

If computing colleges have erred, it may be in failing to exert their power with even greater zeal. For all their talk of growth and expansion within academia, the computing deans’ ambitions seem remarkably modest. Martial Hebert, the dean of Carnegie Mellon’s computing school, almost sounded like he was talking about the liberal arts when he told me that CS is “a rich tapestry of disciplines” that “goes far beyond computers and coding.” But the seven departments in his school correspond to the traditional, core aspects of computing plus computational biology. They do not include history, for example, or finance. Bala and Isbell talked about incorporating law, policy, and psychology into their programs of study, but only in the form of hiring individual professors into more traditional CS divisions. None of the deans I spoke with aspires to launch, say, a department of art within their college of computing, or one of politics, sociology, or film. Their vision does not reflect the idea that computing can or should be a superordinate realm of scholarship, on the order of the arts or engineering. Rather, they are proceeding as though it were a technical school for producing a certain variety of very well-paid professionals. A computing college deserving of the name wouldn’t just provide deeper coursework in CS and its closely adjacent fields; it would expand and reinvent other, seemingly remote disciplines for the age of computation.

Near the end of our conversation, Isbell mentioned the engineering fallacy, which he summarized like this: Someone asks you to solve a problem, and you solve it without asking if it’s a problem worth solving. I used to think computing education might be stuck in a nesting-doll version of the engineer’s fallacy, in which CS departments have been asked to train more software engineers without considering whether more software engineers are really what the world needs. Now I worry that they have a bigger problem to address: how to make computer people care about everything else as much as they care about computers.

This article originally mischaracterized the views of MIT’s computing dean, Daniel Huttenlocher. He did not say that computer science would be held back in an arts-and-science or engineering context, or that it needs to be independent.

IMAGES

  1. How to Write a Master's Thesis in Computer Science

    master thesis computer science example

  2. Excellent Thesis for Computer Science: Blogs for educational excellence

    master thesis computer science example

  3. Sample Thesis Titles For Computer Science

    master thesis computer science example

  4. (PDF) Master’s Thesis in Computing Science

    master thesis computer science example

  5. 🎉 Research paper topics for computer science. Latest Topics in Computer

    master thesis computer science example

  6. Master thesis computer science examples

    master thesis computer science example

VIDEO

  1. Master's thesis examination, Universitas Islam Negeri Maulana Malik Ibrahim Malang

  2. Computer Engineering Capstone Thesis Project

  3. How to Write RESEARCH ABSTRACT

  4. Real Time Cross Platform Collaboration Between Virtual Reality (VR) & Mixed Reality (MR)

  5. How to write thesis for Bachelor/Master/M.Phil/PhD Part 2(Last Part)

  6. Computer Science in 2 Years

COMMENTS

  1. Computer Science Masters Theses

    COMPUTER VISION IN ADVERSE CONDITIONS: SMALL OBJECTS, LOW-RESOLUTION IMAGES, AND EDGE DEPLOYMENT, Raja Sunkara. Theses from 2022 PDF. Maximising social welfare in selfish multi-modal routing using strategic information design for quantal response travelers, Sainath Sanga. PDF. Man-in-the-Middle Attacks on MQTT based IoT networks, Henry C. Wong

  2. Computer Science Masters Thesis Collection

    Theses/Dissertations from 2013. Alsafeer software for teaching computer literacy, Zieb Rabie Alqahtani. Wireless electronic scoring of kendo competition matches using an embedded system, Edward B. Hogan. Using phishing to test social engineering awareness of financial employees, Rebecca M. Long.

  3. Computer Science Graduate Projects and Theses

    The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...

  4. Computer Science Theses and Dissertations

    Theses/Dissertations from 2023. PDF. Classification of DDoS Attack with Machine Learning Architectures and Exploratory Analysis, Amreen Anbar. PDF. Multi-view Contrastive Learning for Unsupervised Domain Adaptation in Brain-Computer Interfaces, Sepehr Asgarian. PDF. Improved Protein Sequence Alignments Using Deep Learning, Seyed Sepehr Ashrafzadeh.

  5. Computer Science and Engineering Theses and Dissertations

    Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications, Arup Kanti Dey. PDF. AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing, Hamza Elhamdadi. PDF. Automatic Detection of Vehicles in Satellite Images for Economic Monitoring, Cole Hill. PDF

  6. Brown CS: Master's Project Reports

    Zhang, Minrui. CS2980: Model-based Semantic Compression in Database Project Report (478.9 KB) Zhang, Shu. Column-based Database Semantic Compression and Prediction-based Query Optimization (551.8 KB) Zhong, Zhigang. Fractal Tree Implementation with Intel Hardware Supported Transactional Memory (106.1 KB)

  7. Computer Science Master's Theses

    Displaying 1 to 10 of 57. The Digital Repository Service is a secure repository system, designed to store and share scholarly, administrative, and archival materials from the Northeastern University community. The DRS was developed by the Northeastern University Library as a tool for University faculty and staff to protect the valuable ...

  8. How to Write a M.Sc. Thesis

    An acceptable M.Sc. thesis in Computer Science should attempt to satisfy one or more of the following criteria: Original research results are explained clearly and concisely. The thesis explains a novel exploratory implementation or a novel empirical study whose results will be of interest to the Computer Science community in general and to a ...

  9. PDF How to Produce a Computer Science Thesis Introduction

    The thesis statement is a refined and succinct set of arguments that define what you will demonstrate or prove in the thesis—it is your position. It is the "point" of your work. The statement can be very short or many pages in length. If an oral defense were a battle, this is the ground you fight to hold.

  10. Sample Masters Thesis/Projects

    Sample Masters Thesis/Projects. Sample Computer Science Masters Theses. Implementation of a Cartesian Grid Incompressible Navier-Stokes Solver on Multi-GPU Desktop Platforms Using CUDA. (Julien C. Thibault, 2009) Application of Parallel CompPerforming an Unsupervised Fluoroscopic Analysis of Knee Joint Kinematics. (Renu Ramanatha, 2009)

  11. How to Write a Master's Thesis in Computer Science

    There needs to a statement of (1) the problem to be studied, (2) previous work on the problem, (3) the software requirements, (4) the goals of the study, (5) an outline of the proposed work with a set of milestones, and (6) a bibliography.

  12. Prize-Winning Thesis and Dissertation Examples

    Award: 2017 Royal Geographical Society Undergraduate Dissertation Prize. Title: Refugees and theatre: an exploration of the basis of self-representation. University: University of Washington. Faculty: Computer Science & Engineering. Author: Nick J. Martindell. Award: 2014 Best Senior Thesis Award. Title: DCDN: Distributed content delivery for ...

  13. MIT Theses

    Theses in this collection have been scanned by the MIT Libraries or submitted in electronic format by thesis authors. Since 2004 all new Masters and Ph.D. theses are scanned and added to this collection after degrees are awarded. MIT Theses are openly available to all readers. Please share how this access affects or benefits you.

  14. Past Theses

    The following is a list of some of the recently completed CS Masters Theses. Date. Student. Adviser. Title. 13-Dec-16. Arpita Banerjee. Eckberg. Study of H.264 Video Streaming over Wireless Channel using GStreamer.

  15. Computer Science Department Dissertations Collection

    Geometric Representation Learning, Luke Vilnis, Computer Science. PDF. Understanding of Visual Domains via the Lens of Natural Language, Chenyun Wu, Computer Science. PDF. Towards Practical Differentially Private Mechanism Design and Deployment, Dan Zhang, Computer Science. PDF. Audio-driven Character Animation, Yang Zhou, Computer Science

  16. A list of master's thesis topics in computer science

    Computer DNA analysis. Examples of topic ideas for a Master's Thesis in Computer Science project. Taking into consideration, the ideas presented above, here are the following examples: A study to evaluate the challenges and benefits of using robotics in the offer of services.

  17. Master's Thesis in Computer Science

    Master's Thesis in Computer Science. A Master's Thesis is expected to contain the following items: In particular, the review of the state of the art should be thorough and the work performed should advance the state of the art. Each Master's Thesis will be read and judged by a thesis committee consisting of the candidate's supervisor, a faculty ...

  18. PDF Masters Thesis/Project Proposal

    thesis/project, e.g., the hypothesis to be tested, the thesis to be defended, the project to be completed, the question to be answered, etc. Methods - The method to be followed in accomplishing the thesis/project statement, i.e., proposed algorithms, procedures, controls, sample sizes, experiments, and expected results, etc.

  19. Computer Science

    Specializations. Master of Science (MSc) Thesis-based in Computer Science, Software Engineering Specialization . The specialization is offered jointly through the Department of Computer Science and the Department of Electrical and Software Engineering. Wearable Technology Interdisciplinary Specialization.

  20. Master Thesis

    In a Master's Thesis, candidates show their ability to independently perform scientific research on an appropriately challenging theme that also gives them the opportunity to develop their own ideas. On the basis of the "state-of-the-art" processes, the students must systematically apply the methods of computer science.

  21. [PDF] Master's Thesis in Computer Science

    Master's Thesis in Computer Science. F. Kuhn, A. Podelski, A. Ludwig. Published 2014. Computer Science. TLDR. This thesis argues that it is beneficial to interface the higher-level ''dynamic'' programming languages to lower-level ''static'' programming languages, and proposes a way for interfacing these in such a way, that the ...

  22. Example MS Thesis Outline

    Example MS Thesis Outline. Introduction. Problem definition. describe what you trying to do. clearly state the question being addressed. when appropriate formulate a testable hypothesis. Describe the motivation; who is interested in the solution. Summarize the results and their significance. Background.

  23. Theses in the Department of Computer Science

    A thesis can only be started if at least 120 ECTS have been acquired in the Bachelor, and at least 60 ECTS in the Master. These ECTS must be entered on the transcript of records! The examiner of a thesis MUST be a professor of the Department of Computer Science. The examiner issues the topic and gives the final grade for the thesis.

  24. Universities Have a Computer-Science Problem

    The case for teaching coders to speak French. Updated at 5:37 p.m. ET on March 22, 2024. Last year, 18 percent of Stanford University seniors graduated with a degree in computer science, more than ...