Theses and Projects
Open Theses and Student Project Topics
The Computer Networks Group is always looking for motivated students to work on various topics. If you are interested in any of the projects below, or if you have other ideas and are willing to work with us, please don't hesitate to contact us.
- (B) Bachelor thesis
- (M) Master thesis
- (P) Student project
Future Internet architecture
- Network Management: Information Centric Networking (ICN) based solution for Network Management (B/M/P)
- if you are interested in other topics in this area please get in contact with Mayutan Arumaithurai, Jiachen Chen, Edo Monticelli
Data Crawling and analysis
- if you are interested in other topics in this area please get in contact with Mayutan Arumaithurai
Mobile Networking
- Context-aware networking (M/P)
- if you are interested in other topics in this area please get in contact with Yuan Zhang-->
Massive Data Mining and Recommender System
- if you are interested in other topics in this area please get in contact with Hong Huang
Social Networking
- Topic prediction in online social networks (B/M/P)(Hong Huang)
- Mining emotion patterns in online social networks (B/M/P)(Hong Huang)
- Gemstone: Decentralizing Social Networks (B/M/P)
- Privacy protection in social network applications (B/M/P) (Konglin Zhu)
- Mobile effects in online social networks (B/M/P) (Konglin Zhu)
- Opportunistic social sensing as an enabling technology for smart cities (B/M/P) (Stephan Sigg)
- Bringing offline social networks online (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with David Koll, Dr. Wenzhong Li or Hong Huang
Device-free recognition from RF-signals
- Indoor localisation based on RF-signal-strength (M/P)
- Activity recognition from RSSI on android mobile phones (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Context-based security for mobile devices
- Secure authentication from ambient audio (B/M/P) (Stephan Sigg)
- Unattended context-based authentication with fuzzy cryptography (B/M/P) (Stephan Sigg)
- Environment-adaptive adjustment of audio-based security on mobile phones (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Mathematical calculations using superimpositions on the RF-channel
- Utilising convolutions of random functions for calculations on the RF-channel (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Mobile, Pervasive and Ubiquitous Computing
- Android/Iphone/Ubuntu touch development of an environment-reactive app (B/M/P) (Stephan Sigg)
- if you are interested in other topics in this area please get in contact with Stephan Sigg
Ongoing Topics
Topic | Topic advisor | Initial readings | Description | Student |
Analysis of text messages for emergency Services (Under key competency module) | Mayutan Arumaithurai | Currently, emergency services are not designed to perform a sentiment analysis on text messages without human intervention to efficiently provide emergency services. This work will develop such a tool. | Assigned to Pranay Tare, Gurjinder Singh | |
Conformance Testing of Lost server for Emergency Services (Under key competency module) | Mayutan Arumaithurai | [1], [2] | Though, the Internet and communication means have advanced, Emergency calls (i.e. 112) can only be performed by traditional phone calls. Emergency service providers cannot handle VoIP, text and video messages. Handling such messages will allow emergency service providers to scale and thereby handle large scale emergency. This task will involve conformance testing of LoST server. | Assigned to Florian Unger |
Implementation of Location Information Server (Under key competency module) | Mayutan Arumaithurai | [3], [4] | Though, the Internet and communication means have advanced, Emergency calls (i.e. 112) can only be performed by traditional phone calls. Emergency service providers cannot handle VoIP, text and video messages. Handling such messages will allow emergency service providers to scale and thereby handle large scale emergency. This task will involve implementing a lIS server to identify the location of a VOIP client. | Assigned to Vijay Soppadandi |
Implement and Evaluate FlowTag in SDN (Under key competency module) | Mayutan Arumaithurai | SDN, MiniNet | This project will implement and evaluate the performance of Flowtag in SDN | Assigned to Hari Raghavendar Rao Bandari |
Real time analysis to predict the future of companies (Under key competency module) | Mayutan Arumaithurai | Spark, Twitter Storm | This project will perform a study of stream processing tools and methods and analyse their accuracy in predicting the future based on past data | Assigned to Karthik Sharma |
Real time analysis to study the accuracy of gene matching (Under key competency module) | Mayutan Arumaithurai | Spark, Twitter Storm | This project will perform a study of stream processing tools and methods to analyse the speed and accuracy of predicting if a certain gene pattern matches existing gene patterns in the data base. | Assigned to Uche Oteh |
Analyze the effect of ICN on energy saving (ITIS Research Project) | Mayutan Arumaithurai | ICN | Analyze the benefits of ICN in terms of energy saving potential | Assigned to Alberto Rivera Diaz (Status update: [5]) |
How can ICN help DTN? (Master thesis Project) | Edo Monticelli,Mayutan Arumaithurai | ICN, DTN | Improve ICN to better support DTN environments | Assigned to Benno |
Personalized Recommender System Design (Master thesis Project) | Hong Huang | Build a personalized context-aware recommender system for customers according to their own interest. | Assigned to Haile Misgna | |
Emotion Patterns Analysis in OSNs (Bachelor thesis Project) | Hong Huang,Xu Chen | We aim to study the emotion patterns in the Twitter service and predict the future emotion status of users. | Assigned to Stefan Peters | |
Activity recognition from GSM signal strength information (Bachelor thesis Project) | Stephan Sigg | [6] | Utilising an open firmware and GSM stack for mobile phones, signal strength information is analysed and interpreted for environmental motion and gestures | Marko Becker |
Activity recognition from WiFi RSSI | Stephan Sigg | [7] | Development of a demonstration platform for motion and gesture recognition from WiFi RSSI on android mobile phones | Christoph Rauterberg |
Indoor localisation from device-free RF | Stephan Sigg | [8] | Investigation of device-free RF-based indoor localisation with software defined radio devices | Nguyen Chuong Tach |
Social Network Architectures
- Securing Decentralized OSNs against the Man-in-the-Middle-Attack (M)
- Supervised by David Koll
Completed Topics
- Implementation and Deployment of a Measurement Prototype for Decentralized OSNs (P) (supervised by David Koll)
- GEMSTONE goes Mobile (B) (supervised by David Koll)
- Transitioning of Social Graphs between Multiple Online Social Networks (B) (supervised by David Koll)
- Prevention and Mitigation of (D)DoS Attacks in Enterprise Environments (B) (supervised by David Koll)
- For a full list of older topics please go here.