Theses and Projects: Difference between revisions

From NET Wiki
Jump to navigation Jump to search
Line 41: Line 41:
=== Massive Data Mining and Recommender System===
=== Massive Data Mining and Recommender System===


* [[Data Mining of the Web : User Behavior Analysis]] (B/M/P)   
* [[Data Mining of the Web : User Behavior Analysis]] (B/M/P)  [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]


* [[Building the Genealogy for Researchers]] (B/M/P)
* [[Building the Genealogy for Researchers]] (B/M/P)[http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]


* [[Recommender System Design]] (B/M/P)
* [[Recommender System Design]] (B/M/P)[http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]


* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]
* if you are interested in other topics in this area please get in contact with [http://www.net.informatik.uni-goettingen.de/people/hong_huang Hong Huang]

Revision as of 13:50, 23 October 2014

Open Theses and Student Project Topics

The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.

  • (B) Bachelor thesis
  • (M) Master thesis
  • (P) Student project


Future Internet architecture

Data Crawling and analysis

Mobile Networking

  • if you are interested in other topics in this area please get in contact with Yuan Zhang-->

Massive Data Mining and Recommender System

  • if you are interested in other topics in this area please get in contact with Hong Huang

Social Networking

Device-free recognition from RF-signals

Context-based security for mobile devices

Mathematical calculations using superimpositions on the RF-channel

Mobile, Pervasive and Ubiquitous Computing

Ongoing Topics

Topic Topic advisor Initial readings Description Student
Implementation of Location Information Server (Under key competency module) Mayutan Arumaithurai [1], [2] Though, the Internet and communication means have advanced, Emergency calls (i.e. 112) can only be performed by traditional phone calls. Emergency service providers cannot handle VoIP, text and video messages. Handling such messages will allow emergency service providers to scale and thereby handle large scale emergency. This task will involve implementing a lIS server to identify the location of a VOIP client. Assigned to Vijay Soppadandi
Real time analysis to predict the future of companies (Under key competency module) Mayutan Arumaithurai Spark, Twitter Storm This project will perform a study of stream processing tools and methods and analyse their accuracy in predicting the future based on past data Assigned to Karthik Sharma ‎
Real time analysis to study the accuracy of gene matching (Under key competency module) Mayutan Arumaithurai Spark, Twitter Storm This project will perform a study of stream processing tools and methods to analyse the speed and accuracy of predicting if a certain gene pattern matches existing gene patterns in the data base. Assigned to Uche Oteh ‎
Analyze the effect of ICN on energy saving (ITIS Research Project) Mayutan Arumaithurai ICN Analyze the benefits of ICN in terms of energy saving potential Assigned to Alberto Rivera Diaz
How can ICN help DTN? (Master thesis Project) Edo Monticelli,Mayutan Arumaithurai ICN, DTN Improve ICN to better support DTN environments Assigned to Benno
Personalized Recommender System Design (Master thesis Project) Hong Huang Build a personalized context-aware recommender system for customers according to their own interest. Assigned to Haile Misgna
Mining emotions patterns in OSNs (Bachelor thesis Project) Hong Huang,Xu Chen We aim to study the emotion patterns in the Twitter service and predict the future emotion status of users. Assigned to Stefan Peters


Social Network Architectures

  • Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
  • Supervised by David Koll

Completed Topics

  • Implementation and Deployment of a Measurement Prototype for Decentralized OSNs (P) (supervised by David Koll)
  • GEMSTONE goes Mobile (B) (supervised by David Koll)
  • Transitioning of Social Graphs between Multiple Online Social Networks (B) (supervised by David Koll)
  • Prevention and Mitigation of (D)DoS Attacks in Enterprise Environments (B) (supervised by David Koll)
  • For a full list of older topics please go here.