Theses and Projects
Open Theses and Student Project Topics
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.
- (B) Bachelor thesis
- (M) Master thesis
- (P) Student project
Future Internet architecture
- Network Management: Information Centric Networking (ICN) based solution for Network Management (B/M/P)
- if you are interested in other topics in this area please get in contact with Mayutan Arumaithurai, Jiachen Chen, Edo Monticelli
Data Crawling and analysis
- if you are interested in other topics in this area please get in contact with Mayutan Arumaithurai
Mobile Networking
- Context-aware networking (M/P)
- if you are interested in other topics in this area please get in contact with Yuan Zhang-->
Massive Data Mining
- if you are interested in other topics in this area please get in contact with Hong Huang
Social Networking
- Topic prediction in online social networks (B/M/P)(Hong Huang)
- Mining emotion patterns in online social networks (B/M/P)(Hong Huang)
- Gemstone: Decentralizing Social Networks (B/M/P)
- Privacy protection in social network applications (B/M/P) (Konglin Zhu)
- Mobile effects in online social networks (B/M/P) (Konglin Zhu)
- Opportunistic social sensing as an enabling technology for smart cities (B/M/P) (Stephan Sigg)
- Bringing offline social networks online (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with David Koll, Dr. Wenzhong Li or Hong Huang
Device-free recognition from RF-signals
- Indoor localisation based on RF-signal-strength (M/P)
- Activity recognition from RSSI on android mobile phones (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Context-based security for mobile devices
- Secure authentication from ambient audio (B/M/P) (Stephan Sigg)
- Unattended context-based authentication with fuzzy cryptography (B/M/P) (Stephan Sigg)
- Environment-adaptive adjustment of audio-based security on mobile phones (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Mathematical calculations using superimpositions on the RF-channel
- Utilising convolutions of random functions for calculations on the RF-channel (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Mobile, Pervasive and Ubiquitous Computing
- Android/Iphone/Ubuntu touch development of an environment-reactive app (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Ongoing Topics
Topic | Topic advisor | Initial readings | Description | Student |
Implementation of Location Information Server (Under key competency module) | Mayutan Arumaithurai | [1], [2] | Though, the Internet and communication means have advanced, Emergency calls (i.e. 112) can only be performed by traditional phone calls. Emergency service providers cannot handle VoIP, text and video messages. Handling such messages will allow emergency service providers to scale and thereby handle large scale emergency. This task will involve implementing a lIS server to identify the location of a VOIP client. | Assigned to Vijay Soppadandi |
Real time analysis to predict the future of companies (Under key competency module) | Mayutan Arumaithurai | Spark, Twitter Storm | This project will perform a study of stream processing tools and methods and analyse their accuracy in predicting the future based on past data | Assigned to Karthik Sharma |
Real time analysis to study the accuracy of gene matching (Under key competency module) | Mayutan Arumaithurai | Spark, Twitter Storm | This project will perform a study of stream processing tools and methods to analyse the speed and accuracy of predicting if a certain gene pattern matches existing gene patterns in the data base. | Assigned to Uche Oteh |
Analyze the effect of ICN on energy saving (ITIS Research Project) | Mayutan Arumaithurai | ICN | Analyze the benefits of ICN in terms of energy saving potential | Assigned to Alberto Rivera Diaz |
How can ICN help DTN? (Master thesis Project) | Edo Monticelli,Mayutan Arumaithurai | ICN, DTN | Improve ICN to better support DTN environments | Assigned to Benno |
Social Network Architectures
- Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
- Supervised by David Koll
Completed Topics
- Implementation and Deployment of a Measurement Prototype for Decentralized OSNs (P) (supervised by David Koll)
- GEMSTONE goes Mobile (B) (supervised by David Koll)
- Transitioning of Social Graphs between Multiple Online Social Networks (B) (supervised by David Koll)
- Prevention and Mitigation of (D)DoS Attacks in Enterprise Environments (B) (supervised by David Koll)
- For a full list of older topics please go here.