PhD candidates: You are welcome and encouraged to deposit your dissertation here, but be aware that
1) it is optional, not required (the ProQuest deposit is required); and
2) it will be available to everyone on the Internet; there is no embargo for dissertations in the UNL DigitalCommons.
Master's candidates: Deposit of your thesis or project is required. (If an embargo, [restricted access] is necessary, you may deposit the thesis at http://digitalcommons.unl.edu/embargotheses/ — but only after getting the prior approval of your department and the Graduate Office; contact Terri Eastin).
All depositors: We try to observe a 24-hour "cooling off" period to give you opportunity to correct those "oops" issues that seem to emerge just after deposit.
Upon deposit, you will immediately receive an email that your submission has been received (and this is what you need to show the Graduate Office).
However, you can still log back in and select Revise and upload a new version with your advisor's name spelled right, or your mother thanked in the Acknowledgments, or whatever you're stressing about.
After about a day, your submission will be "published" or "posted", making it available to the Internet; you will get another email to that effect, and your submission can no longer be changed--by you.
If further changes are needed, these can be made by sending a revised file to the administrator < firstname.lastname@example.org > requesting replacement of the current online version. DO NOT RESUBMIT YOUR THESIS / DISSERTATION. That creates duplicate records, confusion, wasted effort, frustration, sadness, tears, and causes kittens to get sick.
Finally: Congratulations; you are almost there. Click the "Submit your paper or article" link at the bottom of the gray box at left. Follow the instructions. You should be able to copy (Ctrl-C) and paste (Ctrl-V) most fields.
You are the sole author; your advisor is not considered a co-author.
Your institution is "University of Nebraska-Lincoln" (not "at Lincoln" or ", Lincoln"). Do not leave it blank; then the administrator has to fill it in, and he is tempted to make it something silly.
You do not need to repeat your name and title in the Abstract field; just the body of the abstract.
When you reach the question "Was this submission previously published in a journal?", just skip that part.
Be sure to click the "Submit" button at the bottom. Files upload at the rate of about 5 Mb per minute, so if you have an ungodly large file, it may take a bit of time. If your file exceeds 40 Mb, think about reducing its size--there are many ways; Google "reduce pdf file size" to find some.
Okay, get started. That thesis is not going to submit itself.
Detection of Plant Emergence Based on Spatio Temporal Image Sequence Analysis, Bhushit Agarwal
Investigating Diversity in Open Multiagent Team Formation, Pooja Ahuja
An Unmanned Aerial System for Prescribed Fires, Evan M. Beachly
PLANT IMAGE PROCESSING: 3D VOLUME RECONSTRUCTION, HYPERSPECTRAL INFORMATION MINING AND VISUALIZATION, Shi Cao
INVESTIGATING AGENT AND TASK OPENNESS IN ADHOC TEAM FORMATION, Bin Chen
Hierarchical Active Learning Application to Mitochondrial Disease Protein Dataset, James D. Duin
Design and Implementation of a Stand-Alone Tool for Metabolic Simulations, Milad Ghiasi Rad
Exploring the Telecommunications Properties of the Human Nervous System: Analytical Modeling and Experimental Validation of Information Flow through the Somatosensory System, Natalie Hanisch
Analytical Modeling of a Communication Channel Based on Subthreshold Stimulation of Neurobiological Networks, Alireza Khodaei
Rate based Impact Analysis, Nishant Sharma
Deep Learning and Transfer Learning in the Classification of EEG Signals, Jacob M. Williams
Querying and Visualization of Moving Objects Using Constraint Databases, Semere M. Woldemariam
Study of comparison of OCS and Hybrid switching in FSO data centers, Suraj Yadav
Feature Extraction and Parallel Visualization for Large-Scale Scientific Data, Lina Yu
Autonomous UAVs for Near Earth Environmental Sensing, David J. Anthony
TOWARDS BUILDING AN INTELLIGENT INTEGRATED MULTI-MODE TIME DIARY SURVEY FRAMEWORK, Hariharan Arunachalam
Determination of Plant Architecture and Component Phenotyping Based on Time-lapse Image Analysis, Srinidhi Bashyam
Using Software Testing Techniques to Infer Biological Models, Mikaela Cashman
A ROADMAP TO SAFE AND RELIABLE ENGINEERED BIOLOGICAL NANO-COMMUNICATION NETWORKS, Justin W. Firestone
Why Do Record/Replay Tests of Web Applications Break?, Mouna Hammoudi
A New System for Human MicroRNA functional Evaluation and Network, Jiachun Han
SEMEO: A SEMANTIC EQUIVALENCE ANALYSIS FRAMEWORK FOR OBFUSCATED ANDROID APPLICATIONS, Zhen Hu
Towards building a review recommendation system that trains novices by leveraging the actions of experts, Shilpa Khanal
Exploring Dynamic Memory Allocations for Bioinformatics Applications, Nitya Kovur
Finding DNA Motifs: A Probabilistic Suffix Tree Approach, Abhishek Majumdar
Sonifying Git History, Kevin J. North
OPTIMIZATION OF IRRIGATION DECISION IN CORNSOYWATER, Dharmic Payyala
TESTING THE INDEPENDENCE HYPOTHESIS OF ACCEPTED MUTATIONS FOR PAIRS OF ADJACENT AMINO ACIDS IN PROTEIN SEQUENCES, Jyotsna Ramanan
On Path Consistency for Binary Constraint Satisfaction Problems, Christopher G. Reeson
USE OF CLUSTERING TECHNIQUES FOR PROTEIN DOMAIN ANALYSIS, Eric Rodene
The Effect of Frequency Resolution on Intelligibility Sentence and its Relevance to Cochlear Implant Design, Seth H. Roy
EventFlowSlicer: A Goal-based Test Case Generation Strategy for Graphical User Interfaces, Jonathan Saddler
Characterization of Molecular Communication Based on Cell Metabolism Through Mutual Information and Flux Balance Analysis, Zahmeeth Sayed Sakkaff
Significant Permission Identification for Android Malware Detection, Lichao Sun
Power Management in Heterogeneous MapReduce Cluster, Rojee Sunuwar
ACTIVITY ANALYSIS OF SPECTATOR PERFORMER VIDEOS USING MOTION TRAJECTORIES, Anish Timsina
Improving the Efficiency of CI with Uber-commits, Matias Waterloo
ON OPTIMIZATIONS OF VIRTUAL MACHINE LIVE STORAGE MIGRATION FOR THE CLOUD, Yaodong Yang
Joint Resource Provisioning in Optical Cloud Networks, Pan Yi
SECURE AND LIGHTWEIGHT HARDWARE AUTHENTICATION USING ISOLATED PHYSICAL UNCLONABLE FUNCTION, Mehrdad Zaker Shahrak
Rectilinear Steiner Tree Construction, Zhiliu Zhang
AN EXTENDABLE VISUALIZATION AND USER INTERFACE DESIGN FOR TIME-VARYING MULTIVARIATE GEOSCIENCE DATA, Yanfu Zhou
Dynamic Data Management In A Data Grid Environment, Björn Barrefors
A Visual Analysis of Articulated Motion Complexity Based on Optical Flow and Spatial-Temporal Features, Beau Michael Christ
Reflective, Deliberative Agent-Based Information Gathering, Adam D. Eck
Routing Optimization in Interplanetary Networks, Sara El Alaoui
REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS, Santiago Manuel Gimenez Ocano
Model-Based Condition Monitoring and Power Management for Rechargeable Electrochemical Batteries, Taesic Kim
Using Software-Defined Networking to Improve Campus, Transport and Future Internet Architectures, Adrian Lara
Discovery Over Application: A Case Study of Misaligned Incentives in Software Engineering, Eric F. Rizzi
Transforming C OpenMP Programs for Verification in CIVL, Michael Rogers
On Problematic Robotic Thresholds, Adam K. Taylor
Enabling Distributed Scientific Computing on the Campus, Derek J. Weitzel
Visual Analytics for Large Communication Trace Data, Jieting Wu
Bandwidth Estimation for Virtual Networks, Ertong Zhang
A COMPARATIVE STUDY OF GENERALIZED ARC-CONSISTENCY ALGORITHMS, Olufikayo S. Adetunji
A COMPARATIVE STUDY OF UNDERWATER ROBOT PATH PLANNING ALGORITHMS FOR ADAPTIVE SAMPLING IN A NETWORK OF SENSORS, Sreeja Banerjee
DECAF: A New Event Detection Logic For The Purpose Of Fusing Delineated-Continuous Spatial Information, Kerry Q. Hart
DNN: A Distributed NameNode Filesystem for Hadoop, Ziling Huang
INVARIANT INFERRING AND MONITORING IN ROBOTIC SYSTEMS, Hengle Jiang
IMPROVING PREFERENCE RECOMMENDATION AND CUSTOMIZATION IN REAL WORLD HIGHLY CONFIGURABLE SOFTWARE SYSTEMS, Dongpu Jin
Using a UAV to Effectively Prolong Wireless Sensor Network Lifetime with Wireless Power Transfer, Jinfu Leng
ANALYSIS, OPTIMIZATION, AND IMPLEMENTATION OF A UAV-BASED WIRELESS POWER TRANSFER SYSTEM, Andrew Mittleider
A New Spatio-Temporal Data Mining Method and its Application to Reservoir System Operation, Abhinaya Mohan
Autonomous Aerial Water Sampling, John-Paul W. Ore
Measuring Autonomy And Solving General Stabilization Problems With Multi-Agent Systems, Rasheed A. Rajabzadeh
A Self-Adaptive Framework for Failure Avoidance in Configurable Software, Jacob Swanson
POWER MANAGEMENT IN THE CLUSTER SYSTEM, Leping Wang
SimExplorer: A Testing Framework to Detect Elusive Software Faults, Tingting Yu
A Methodology and Tool for Concurrent Fault Injection, ZhongYin Zhang
Understanding Human Learning Using a Multiagent Based Unified Learning Model Simulation, Vlad T. Chiriacescu
Decentralized Collision Avoidance, Jayasri K. Janardanan
Online Ecosystems in Software Development, Corey J. Jergensen
Practical Tractability of CSPS by Higher Level Consistency and Tree Decomposition, Shant Karakashian
Improving Virtual Collaboration: Modeling for Recommendation Systems in a Classroom Wiki Environment, Derrick A. Lam
Discovering Divergence: A Framework for Finding Unexpected Behavior Using Directed Exploration, Heath G. Roehr
FastLane: Flow-Based Channel Assignment in Dense Wireless Networks, Dane N. Seaberg
Clustering and Classification of Multi-domain Proteins, Neethu Shah
Algorithms for Grid Graphs in the MapReduce Model, Taylor P. Spangler
Solving the Search for Source Code, Kathryn T. Stolee
User Modeling via Machine Learning and Rule-Based Reasoning to Understand and Predict Errors in Survey Systems, Leonard Cleve Stuart
Test Advising Framework, Yurong Wang
Energy-efficient Failure Recovery in Hadoop Cluster, Weiyue Xu
Directed Test Suite Augmentation, Zhihong Xu
Automated Test Case Generation to Validate Non-functional Software Requirements, Pingyu Zhang
Data Mining of Protein Databases, Christopher Assi
SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING, William P. Bennett Jr
Statistical Software Properties: Definition, Inference and Monitoring, Javier A. Darsie
Improving Performance of Solid State Drives in Enterprise Environment, Jian Hu
A WLAN Fingerprinting Based Indoor Localization Technique, Landu Jiang
Dynamic Data Race Detection and Healing, Du Li
Modeling of Yeast Pheromone Pathway using Petri Nets, Abhishek Majumdar
Improving Backup and Restore Performance for Deduplication-based Cloud Backup Services, Stephen Mkandawire
Routing over the Interplanetary Internet, Joyeeta Mukherjee
On heterogeneous user demands in peer-to-peer video streaming systems, Zhipeng Ouyang
AUTOMATION OF LANDMARK SELECTION FOR RODENT BRAIN MRI-HISTOLOGY REGISTRATION USING THIN-PLATE SPLINES, Ayan Sengupta
Identification of TCP Protocols, Juan Shao
A Unifying Approach to Behavioral Coverage, Elena Sherman
AN ENHANCED SELF-ADAPTIVE MAPREDUCE SCHEDULING ALGORITHM, Xiaoyu Sun
Supporting developer-onboarding with enhanced resource finding and visual exploration, Jianguo Wang
A List Of Computer Science Master's Dissertation Topics
Choosing a topic for your master’s dissertation is a very important step. Everything, largely, depends on your interests and skills. During your studies you’ve found the areas of computer science that you are good at, and which of them you’re planning to improve in the future. Before you embark on the search for a topic, consider the following suggestions that will help you work out an initial strategy.
First of all, you need to choose a good academic supervisor or advisor. It’s highly important to cooperate with a professor whose interests coincide with your topic; otherwise you’ll benefit little from the writing process. Ask around and find out whether previous students were satisfied with his or her supervision.
While searching for a dissertation subject don’t focus only on defended works. Again, ask your professor to give you a list of current issues in the field of computer science that are underdeveloped. Your lecturers have profound experience and are aware of all of the directions of research conducted in their areas of scientific interest. They can suggest a great idea and help you implement it.
Remember that computer science is now widely used in different fields. Its application ranges from physics and medicine to education and entertainment. You can focus on the theoretical part of a certain issue or present your ideas about practical use of a particular program.
Think of the subfields of CS you are keen on:
- Program structure (old and new program structures)
- Computer security (privacy and openness)
- Hardware and software relations (adaptation of hardware to software)
- Complexity theory (computational problems, mathematical issues)
- Algorithms and architectures (machine learning, hardware architectures)
- Artificial intelligence (computer systems able to recognize speech and make decisions)
- Bioinformatics (modeling the processes of the human body)
- Databases and information retrieval (collecting information and creating easy access to it)
- Multimedia (creative technologies, animation, graphics, audio)
- Computational linguistics (natural languages processing, machine translation, voice recognition)
Consider the following list of ideas for your topic:
- New methodologies in computer science education.
- Software management metrics and measurement methods.
- Management of business processes and data.
- Detecting cheating in online games: a behavioral approach.
- Information security and cryptography.
- Real-time systems.
- Route planning for tourists applications.
- Data mining for environmental problems.
- Real-time traffic data for modeling the impact of traffic accidents on road network.
- Computer-assisted education process.
- Security in cloud computing.
- Optical character recognition.
- Search-and-rescue robots: motion and path planning.
- Computational neurobiology.
- Computer-based DNA analysis.