Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals

Computer science articles from across Nature Portfolio

Computer science is the study and development of the protocols required for automated processing and manipulation of data. This includes, for example, creating algorithms for efficiently searching large volumes of information or encrypting data so that it can be stored and transmitted securely.

Latest Research and Reviews

research paper about computer engineering

Incremental high average-utility itemset mining: survey and challenges

  • Shengyi Yang

research paper about computer engineering

A RT-FDTD method of analyzing wireless propagation characteristics in underground mine

  • Xiaoyan Song
  • Gaomin Zhang

research paper about computer engineering

SLKIR: A framework for extracting key information from air traffic control instructions Using small sample learning

  • Peiyuan Jiang

research paper about computer engineering

Preclinical identification of acute coronary syndrome without high sensitivity troponin assays using machine learning algorithms

  • Andreas Goldschmied
  • Manuel Sigle
  • Karin Anne Lydia Müller

research paper about computer engineering

A self-supervised framework for cross-modal search in histopathology archives using scale harmonization

  • Danial Maleki
  • Shahryar Rahnamayan
  • H. R. Tizhoosh

research paper about computer engineering

Research on the innovative application of Shen Embroidery cultural heritage based on convolutional neural network

  • Changyong Zhu

Advertisement

News and Comment

research paper about computer engineering

AI now beats humans at basic tasks — new benchmarks are needed, says major report

Stanford University’s 2024 AI Index charts the meteoric rise of artificial-intelligence tools.

  • Nicola Jones

research paper about computer engineering

Medical artificial intelligence should do no harm

Bias and distrust in medicine have been perpetuated by the misuse of medical equations, algorithms and devices. Artificial intelligence (AI) can exacerbate these problems. However, AI also has potential to detect, mitigate and remedy the harmful effects of bias to build trust and improve healthcare for everyone.

  • Melanie E. Moses
  • Sonia M. Gipson Rankin

research paper about computer engineering

AI hears hidden X factor in zebra finch love songs

Machine learning detects song differences too subtle for humans to hear, and physicists harness the computing power of the strange skyrmion.

  • Nick Petrić Howe
  • Benjamin Thompson

Three reasons why AI doesn’t model human language

  • Johan J. Bolhuis
  • Stephen Crain
  • Andrea Moro

research paper about computer engineering

Generative artificial intelligence in chemical engineering

Generative artificial intelligence will transform the way we design and operate chemical processes, argues Artur M. Schweidtmann.

  • Artur M. Schweidtmann

research paper about computer engineering

Why scientists trust AI too much — and what to do about it

Some researchers see superhuman qualities in artificial intelligence. All scientists need to be alert to the risks this creates.

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

research paper about computer engineering

Home

Search form

Review of computer engineering studies.

research paper about computer engineering

  • ISSN:  2369-0755 (print); 2369-0763 (online)
  • Indexing & Archiving:  EBSCOhost Cabell's Directory Publons ScienceOpen Google Scholar Index Copernicus CrossRef Portico Microsoft Academic CNKI Scholar Baidu Scholar
  • Subject:  Computer Sciences Engineering

research paper about computer engineering

Review of Computer Engineering Studies (RCES) is an international, scholarly and peer-reviewed journal dedicated to providing scientists, engineers and technicians with the latest developments on computer science. The journal offers a window into the most recent discoveries in four categories, namely, computing (computing theory, scientific computing, cloud computing, high-performance computing, numerical and symbolic computing), system (database systems, real-time systems, operating systems, warning systems, decision support systems, information processes and systems, systems integration), intelligence (robotics, bio-informatics, web intelligence, artificial intelligence), and application (security, networking, software engineering, pattern recognition, e-science and e-commerce, signal and image processing, control theory and applications). The editorial board welcomes original, substantiated papers on the above topics, which could provoke new science interest and benefit those devoted to computer science. The journal is published quarterly by the IIETA.

The RCES is an open access journal. All contents are available for free, that is, users are entitled to read, download, duplicate, distribute, print, search or link to the full texts of the articles in this journal without prior consent from the publisher or the author.

Focus and Scope

The RCES welcomes original research papers, technical notes and review articles on the following disciplines:

  • Computing theory
  • Scientific computing
  • Cloud computing
  • High-performance computing
  • Numerical and symbolic computing
  • Database systems
  • Real-time systems
  • Operating systems
  • Warning systems
  • Decision support systems
  • Information processes and systems
  • Systems integration
  • Bio-informatics
  • Web intelligence
  • Artificial intelligence
  • Software engineering
  • Pattern recognition
  • E-science and e-commerce
  • Signal and image processing
  • Control theory and applications

Publication Frequency

The RCES is published quarterly by the IIETA, with four regular issues (excluding special issues) and one volume per year.

Peer Review Statement

The IIETA adopts a double blind review process. Once submitted, a paper dealing with suitable topics will be sent to the editor-in-chief or managing editor, and then be reviewed by at least two experts in the relevant field. The reviewers are either members of our editorial board or special external experts invited by the journal. In light of the reviewers’ comments, the editor-in-chief or managing editor will make the final decision over the publication, and return the decision to the author.

There are four possible decisions concerning the paper: acceptance, minor revision, major revision and rejection. Acceptances means the paper will be published directly without any revision. Minor revision means the author should make minor changes to the manuscript according to reviewers’ comments and submit the revised version to the IIETA. The revised version will be accepted or rejected at the discretion of the editor-in-chief or managing editor. Major revision means the author should modify the manuscript significantly according to reviewers’ comments and submit the revised version to the IIETA. The revised version will be accepted or rejected at the discretion of the editor-in-chief or managing editor. Rejection means the submitted paper will not be published.

If a paper is accepted, the editor-in-chief or managing editor will send an acceptance letter to the author, and ask the author to prepare the paper in MS Word using the  template  of IIETA. 

Plagiarism Policy

Plagiarism is committed when one author uses another work without permission, credit, or acknowledgment. Plagiarism takes different forms, from literal copying to paraphrasing the work of another. The IIETA uses CrossRef to screen for unoriginal material. Authors submitting to an IIETA journal should be aware that their paper may be submitted to CrossRef at any point during the peer-review or production process. Any allegations of plagiarism made to a journal will be investigated by the editor-in-chief or managing editor. If the allegations appear to be founded, we will request all named authors of the paper to give an explanation of the overlapping material. If the explanation is not satisfactory, we will reject the submission, and may also reject future submissions.

For instructions on citing any of IIETA’s journals as well as our  Ethics Statement , see  Policies and Standards .

Indexing Information

Web:  https://www.portico.org/

  •  Index Copernicus 

Web:  http://journals.indexcopernicus.com

  •  Google Scholar 

Web:  http://scholar.google.com

  •  CNKI Scholar 

Web:  http://scholar.cnki.net

Included in

  •  Crossref.org 

Web:  https://www.crossref.org/

ISSN: 2369-0755 (print); 2369-0763 (online)

For Submission Inquiry

Email: [email protected]

research paper about computer engineering

  • Just Published
  • Featured Articles
  • Most Read and Cited
  • Winters’ Multiplicative Model Based Analysis of the Development and Prospects of New Energy Electric Vehicles in China Zhishuo Jin, Yubing Qian
  • Agent-based Analysis and Simulation of Online Shopping Behavior in the Context of Online Promotion Xiaoyi Deng
  • Study of Two Kinds of Analysis Methods of Intrusion Tolerance System State Transition Model Zhiyong Luo, Xu Yang, Guanglu Sun, Zhiqiang Xie
  • A Review on Automated Billing for Smart Shopping System Using IOT Priyanka S. Sahare, Anup Gade, Jayant Rohankar
  • A Review on Automated Billing for Smart Shopping System Using IOT Priyanka S. Sahare, Anup Gade, Jayant Rohank
  • Algorithm Research on the Analysis of College Student Score Jinxin Ma, Limin Cui

Phone: + 1 825 436 9306

Email: [email protected]

Subscription

Language support

Please sign up to receive notifications on new issues and newsletters from IIETA

Select Journal/Journals:

Copyright © 2024 IIETA. All Rights Reserved.

research paper about computer engineering

Engineering with Computers

An International Journal for Simulation-Based Engineering

This is a transformative journal , you may have access to funding.

  • Jessica Zhang

research paper about computer engineering

Latest issue

Volume 40, Issue 2

Latest articles

The trefftz methods for 3d biharmonic equation using directors and in-plane biharmonic functions.

  • Chein-Shan Liu
  • Chung-Lun Kuo

research paper about computer engineering

Fast parametric analysis of trimmed multi-patch isogeometric Kirchhoff-Love shells using a local reduced basis method

  • Margarita Chasapi
  • Pablo Antolin
  • Annalisa Buffa

research paper about computer engineering

Unstructured mesh tools for magnetically confined fusion system simulations

  • Mark S. Shephard
  • Jacob Merson
  • Saurabh Tendulkar

research paper about computer engineering

A novel peridynamics refinement method with dual-horizon peridynamics

  • Zhixin Zeng
  • Xiong Zhang

research paper about computer engineering

Comprehensive polygonal topology optimization for triplet thermo-mechanical-pressure multi-material systems

  • Thanh T. Banh
  • Dongkyu Lee

research paper about computer engineering

Journal updates

Notice: supplementary issues.

Engineering with Computers  accumulated a long list of online first articles over the years. To accommodate these backlogs, six regular issues and five supplementary issues were published in Volume 38 during 2022, with about 50 articles in each issue. These supplementary issues, therefore, represent a continuation of the regular issues.

COVID-19 and impact on peer review

As a result of the significant disruption that is being caused by the COVID-19 pandemic we are very aware that many researchers will have difficulty in meeting the timelines associated with our peer review process during normal times.  Please do let us know if you need additional time. Our systems will continue to remind you of the original timelines but we intend to be highly flexible at this time.

Journal information

  • ACM Digital Library
  • Current Contents/Engineering, Computing and Technology
  • EI Compendex
  • Google Scholar
  • Japanese Science and Technology Agency (JST)
  • OCLC WorldCat Discovery Service
  • Science Citation Index Expanded (SCIE)
  • TD Net Discovery Service
  • UGC-CARE List (India)

Rights and permissions

Springer policies

© Springer-Verlag London Ltd., part of Springer Nature

  • Find a journal
  • Publish with us
  • Track your research

computer science Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Hiring CS Graduates: What We Learned from Employers

Computer science ( CS ) majors are in high demand and account for a large part of national computer and information technology job market applicants. Employment in this sector is projected to grow 12% between 2018 and 2028, which is faster than the average of all other occupations. Published data are available on traditional non-computer science-specific hiring processes. However, the hiring process for CS majors may be different. It is critical to have up-to-date information on questions such as “what positions are in high demand for CS majors?,” “what is a typical hiring process?,” and “what do employers say they look for when hiring CS graduates?” This article discusses the analysis of a survey of 218 recruiters hiring CS graduates in the United States. We used Atlas.ti to analyze qualitative survey data and report the results on what positions are in the highest demand, the hiring process, and the resume review process. Our study revealed that a software developer was the most common job the recruiters were looking to fill. We found that the hiring process steps for CS graduates are generally aligned with traditional hiring steps, with an additional emphasis on technical and coding tests. Recruiters reported that their hiring choices were based on reviewing resume’s experience, GPA, and projects sections. The results provide insights into the hiring process, decision making, resume analysis, and some discrepancies between current undergraduate CS program outcomes and employers’ expectations.

A Systematic Literature Review of Empiricism and Norms of Reporting in Computing Education Research Literature

Context. Computing Education Research (CER) is critical to help the computing education community and policy makers support the increasing population of students who need to learn computing skills for future careers. For a community to systematically advance knowledge about a topic, the members must be able to understand published work thoroughly enough to perform replications, conduct meta-analyses, and build theories. There is a need to understand whether published research allows the CER community to systematically advance knowledge and build theories. Objectives. The goal of this study is to characterize the reporting of empiricism in Computing Education Research literature by identifying whether publications include content necessary for researchers to perform replications, meta-analyses, and theory building. We answer three research questions related to this goal: (RQ1) What percentage of papers in CER venues have some form of empirical evaluation? (RQ2) Of the papers that have empirical evaluation, what are the characteristics of the empirical evaluation? (RQ3) Of the papers that have empirical evaluation, do they follow norms (both for inclusion and for labeling of information needed for replication, meta-analysis, and, eventually, theory-building) for reporting empirical work? Methods. We conducted a systematic literature review of the 2014 and 2015 proceedings or issues of five CER venues: Technical Symposium on Computer Science Education (SIGCSE TS), International Symposium on Computing Education Research (ICER), Conference on Innovation and Technology in Computer Science Education (ITiCSE), ACM Transactions on Computing Education (TOCE), and Computer Science Education (CSE). We developed and applied the CER Empiricism Assessment Rubric to the 427 papers accepted and published at these venues over 2014 and 2015. Two people evaluated each paper using the Base Rubric for characterizing the paper. An individual person applied the other rubrics to characterize the norms of reporting, as appropriate for the paper type. Any discrepancies or questions were discussed between multiple reviewers to resolve. Results. We found that over 80% of papers accepted across all five venues had some form of empirical evaluation. Quantitative evaluation methods were the most frequently reported. Papers most frequently reported results on interventions around pedagogical techniques, curriculum, community, or tools. There was a split in papers that had some type of comparison between an intervention and some other dataset or baseline. Most papers reported related work, following the expectations for doing so in the SIGCSE and CER community. However, many papers were lacking properly reported research objectives, goals, research questions, or hypotheses; description of participants; study design; data collection; and threats to validity. These results align with prior surveys of the CER literature. Conclusions. CER authors are contributing empirical results to the literature; however, not all norms for reporting are met. We encourage authors to provide clear, labeled details about their work so readers can use the study methodologies and results for replications and meta-analyses. As our community grows, our reporting of CER should mature to help establish computing education theory to support the next generation of computing learners.

Light Diacritic Restoration to Disambiguate Homographs in Modern Arabic Texts

Diacritic restoration (also known as diacritization or vowelization) is the process of inserting the correct diacritical markings into a text. Modern Arabic is typically written without diacritics, e.g., newspapers. This lack of diacritical markings often causes ambiguity, and though natives are adept at resolving, there are times they may fail. Diacritic restoration is a classical problem in computer science. Still, as most of the works tackle the full (heavy) diacritization of text, we, however, are interested in diacritizing the text using a fewer number of diacritics. Studies have shown that a fully diacritized text is visually displeasing and slows down the reading. This article proposes a system to diacritize homographs using the least number of diacritics, thus the name “light.” There is a large class of words that fall under the homograph category, and we will be dealing with the class of words that share the spelling but not the meaning. With fewer diacritics, we do not expect any effect on reading speed, while eye strain is reduced. The system contains morphological analyzer and context similarities. The morphological analyzer is used to generate all word candidates for diacritics. Then, through a statistical approach and context similarities, we resolve the homographs. Experimentally, the system shows very promising results, and our best accuracy is 85.6%.

A genre-based analysis of questions and comments in Q&A sessions after conference paper presentations in computer science

Gender diversity in computer science at a large public r1 research university: reporting on a self-study.

With the number of jobs in computer occupations on the rise, there is a greater need for computer science (CS) graduates than ever. At the same time, most CS departments across the country are only seeing 25–30% of women students in their classes, meaning that we are failing to draw interest from a large portion of the population. In this work, we explore the gender gap in CS at Rutgers University–New Brunswick, a large public R1 research university, using three data sets that span thousands of students across six academic years. Specifically, we combine these data sets to study the gender gaps in four core CS courses and explore the correlation of several factors with retention and the impact of these factors on changes to the gender gap as students proceed through the CS courses toward completing the CS major. For example, we find that a significant percentage of women students taking the introductory CS1 course for majors do not intend to major in CS, which may be a contributing factor to a large increase in the gender gap immediately after CS1. This finding implies that part of the retention task is attracting these women students to further explore the major. Results from our study include both novel findings and findings that are consistent with known challenges for increasing gender diversity in CS. In both cases, we provide extensive quantitative data in support of the findings.

Designing for Student-Directedness: How K–12 Teachers Utilize Peers to Support Projects

Student-directed projects—projects in which students have individual control over what they create and how to create it—are a promising practice for supporting the development of conceptual understanding and personal interest in K–12 computer science classrooms. In this article, we explore a central (and perhaps counterintuitive) design principle identified by a group of K–12 computer science teachers who support student-directed projects in their classrooms: in order for students to develop their own ideas and determine how to pursue them, students must have opportunities to engage with other students’ work. In this qualitative study, we investigated the instructional practices of 25 K–12 teachers using a series of in-depth, semi-structured interviews to develop understandings of how they used peer work to support student-directed projects in their classrooms. Teachers described supporting their students in navigating three stages of project development: generating ideas, pursuing ideas, and presenting ideas. For each of these three stages, teachers considered multiple factors to encourage engagement with peer work in their classrooms, including the quality and completeness of shared work and the modes of interaction with the work. We discuss how this pedagogical approach offers students new relationships to their own learning, to their peers, and to their teachers and communicates important messages to students about their own competence and agency, potentially contributing to aims within computer science for broadening participation.

Creativity in CS1: A Literature Review

Computer science is a fast-growing field in today’s digitized age, and working in this industry often requires creativity and innovative thought. An issue within computer science education, however, is that large introductory programming courses often involve little opportunity for creative thinking within coursework. The undergraduate introductory programming course (CS1) is notorious for its poor student performance and retention rates across multiple institutions. Integrating opportunities for creative thinking may help combat this issue by adding a personal touch to course content, which could allow beginner CS students to better relate to the abstract world of programming. Research on the role of creativity in computer science education (CSE) is an interesting area with a lot of room for exploration due to the complexity of the phenomenon of creativity as well as the CSE research field being fairly new compared to some other education fields where this topic has been more closely explored. To contribute to this area of research, this article provides a literature review exploring the concept of creativity as relevant to computer science education and CS1 in particular. Based on the review of the literature, we conclude creativity is an essential component to computer science, and the type of creativity that computer science requires is in fact, a teachable skill through the use of various tools and strategies. These strategies include the integration of open-ended assignments, large collaborative projects, learning by teaching, multimedia projects, small creative computational exercises, game development projects, digitally produced art, robotics, digital story-telling, music manipulation, and project-based learning. Research on each of these strategies and their effects on student experiences within CS1 is discussed in this review. Last, six main components of creativity-enhancing activities are identified based on the studies about incorporating creativity into CS1. These components are as follows: Collaboration, Relevance, Autonomy, Ownership, Hands-On Learning, and Visual Feedback. The purpose of this article is to contribute to computer science educators’ understanding of how creativity is best understood in the context of computer science education and explore practical applications of creativity theory in CS1 classrooms. This is an important collection of information for restructuring aspects of future introductory programming courses in creative, innovative ways that benefit student learning.

CATS: Customizable Abstractive Topic-based Summarization

Neural sequence-to-sequence models are the state-of-the-art approach used in abstractive summarization of textual documents, useful for producing condensed versions of source text narratives without being restricted to using only words from the original text. Despite the advances in abstractive summarization, custom generation of summaries (e.g., towards a user’s preference) remains unexplored. In this article, we present CATS, an abstractive neural summarization model that summarizes content in a sequence-to-sequence fashion while also introducing a new mechanism to control the underlying latent topic distribution of the produced summaries. We empirically illustrate the efficacy of our model in producing customized summaries and present findings that facilitate the design of such systems. We use the well-known CNN/DailyMail dataset to evaluate our model. Furthermore, we present a transfer-learning method and demonstrate the effectiveness of our approach in a low resource setting, i.e., abstractive summarization of meetings minutes, where combining the main available meetings’ transcripts datasets, AMI and International Computer Science Institute(ICSI) , results in merely a few hundred training documents.

Exploring students’ and lecturers’ views on collaboration and cooperation in computer science courses - a qualitative analysis

Factors affecting student educational choices regarding oer material in computer science, export citation format, share document.

Digital Commons @ University of South Florida

  • USF Research
  • USF Libraries

Digital Commons @ USF > College of Engineering > Computer Science and Engineering > Theses and Dissertations

Computer Science and Engineering Theses and Dissertations

Theses/dissertations from 2023 2023.

Refining the Machine Learning Pipeline for US-based Public Transit Systems , Jennifer Adorno

Insect Classification and Explainability from Image Data via Deep Learning Techniques , Tanvir Hossain Bhuiyan

Brain-Inspired Spatio-Temporal Learning with Application to Robotics , Thiago André Ferreira Medeiros

Evaluating Methods for Improving DNN Robustness Against Adversarial Attacks , Laureano Griffin

Analyzing Multi-Robot Leader-Follower Formations in Obstacle-Laden Environments , Zachary J. Hinnen

Secure Lightweight Cryptographic Hardware Constructions for Deeply Embedded Systems , Jasmin Kaur

A Psychometric Analysis of Natural Language Inference Using Transformer Language Models , Antonio Laverghetta Jr.

Graph Analysis on Social Networks , Shen Lu

Deep Learning-based Automatic Stereology for High- and Low-magnification Images , Hunter Morera

Deciphering Trends and Tactics: Data-driven Techniques for Forecasting Information Spread and Detecting Coordinated Campaigns in Social Media , Kin Wai Ng Lugo

Automated Approaches to Enable Innovative Civic Applications from Citizen Generated Imagery , Hye Seon Yi

Theses/Dissertations from 2022 2022

Towards High Performing and Reliable Deep Convolutional Neural Network Models for Typically Limited Medical Imaging Datasets , Kaoutar Ben Ahmed

Task Progress Assessment and Monitoring Using Self-Supervised Learning , Sainath Reddy Bobbala

Towards More Task-Generalized and Explainable AI Through Psychometrics , Alec Braynen

A Multiple Input Multiple Output Framework for the Automatic Optical Fractionator-based Cell Counting in Z-Stacks Using Deep Learning , Palak Dave

On the Reliability of Wearable Sensors for Assessing Movement Disorder-Related Gait Quality and Imbalance: A Case Study of Multiple Sclerosis , Steven Díaz Hernández

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies , Tao Hou

Social Media Time Series Forecasting and User-Level Activity Prediction with Gradient Boosting, Deep Learning, and Data Augmentation , Fred Mubang

A Study of Deep Learning Silhouette Extractors for Gait Recognition , Sneha Oladhri

Analyzing Decision-making in Robot Soccer for Attacking Behaviors , Justin Rodney

Generative Spatio-Temporal and Multimodal Analysis of Neonatal Pain , Md Sirajus Salekin

Secure Hardware Constructions for Fault Detection of Lattice-based Post-quantum Cryptosystems , Ausmita Sarker

Adaptive Multi-scale Place Cell Representations and Replay for Spatial Navigation and Learning in Autonomous Robots , Pablo Scleidorovich

Predicting the Number of Objects in a Robotic Grasp , Utkarsh Tamrakar

Humanoid Robot Motion Control for Ramps and Stairs , Tommy Truong

Preventing Variadic Function Attacks Through Argument Width Counting , Brennan Ward

Theses/Dissertations from 2021 2021

Knowledge Extraction and Inference Based on Visual Understanding of Cooking Contents , Ahmad Babaeian Babaeian Jelodar

Efficient Post-Quantum and Compact Cryptographic Constructions for the Internet of Things , Rouzbeh Behnia

Efficient Hardware Constructions for Error Detection of Post-Quantum Cryptographic Schemes , Alvaro Cintas Canto

Using Hyper-Dimensional Spanning Trees to Improve Structure Preservation During Dimensionality Reduction , Curtis Thomas Davis

Design, Deployment, and Validation of Computer Vision Techniques for Societal Scale Applications , Arup Kanti Dey

AffectiveTDA: Using Topological Data Analysis to Improve Analysis and Explainability in Affective Computing , Hamza Elhamdadi

Automatic Detection of Vehicles in Satellite Images for Economic Monitoring , Cole Hill

Analysis of Contextual Emotions Using Multimodal Data , Saurabh Hinduja

Data-driven Studies on Social Networks: Privacy and Simulation , Yasanka Sameera Horawalavithana

Automated Identification of Stages in Gonotrophic Cycle of Mosquitoes Using Computer Vision Techniques , Sherzod Kariev

Exploring the Use of Neural Transformers for Psycholinguistics , Antonio Laverghetta Jr.

Secure VLSI Hardware Design Against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities , Matthew Dean Lewandowski

Turkic Interlingua: A Case Study of Machine Translation in Low-resource Languages , Jamshidbek Mirzakhalov

Automated Wound Segmentation and Dimension Measurement Using RGB-D Image , Chih-Yun Pai

Constructing Frameworks for Task-Optimized Visualizations , Ghulam Jilani Abdul Rahim Quadri

Trilateration-Based Localization in Known Environments with Object Detection , Valeria M. Salas Pacheco

Recognizing Patterns from Vital Signs Using Spectrograms , Sidharth Srivatsav Sribhashyam

Recognizing Emotion in the Wild Using Multimodal Data , Shivam Srivastava

A Modular Framework for Multi-Rotor Unmanned Aerial Vehicles for Military Operations , Dante Tezza

Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies , Anwesh Tuladhar

Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy , Troi André Williams

Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones , Armin Ziaie Tabari

Theses/Dissertations from 2020 2020

Classifying Emotions with EEG and Peripheral Physiological Data Using 1D Convolutional Long Short-Term Memory Neural Network , Rupal Agarwal

Keyless Anti-Jamming Communication via Randomized DSSS , Ahmad Alagil

Active Deep Learning Method to Automate Unbiased Stereology Cell Counting , Saeed Alahmari

Composition of Atomic-Obligation Security Policies , Yan Cao Albright

Action Recognition Using the Motion Taxonomy , Maxat Alibayev

Sentiment Analysis in Peer Review , Zachariah J. Beasley

Spatial Heterogeneity Utilization in CT Images for Lung Nodule Classication , Dmitrii Cherezov

Feature Selection Via Random Subsets Of Uncorrelated Features , Long Kim Dang

Unifying Security Policy Enforcement: Theory and Practice , Shamaria Engram

PsiDB: A Framework for Batched Query Processing and Optimization , Mehrad Eslami

Composition of Atomic-Obligation Security Policies , Danielle Ferguson

Algorithms To Profile Driver Behavior From Zero-permission Embedded Sensors , Bharti Goel

The Efficiency and Accuracy of YOLO for Neonate Face Detection in the Clinical Setting , Jacqueline Hausmann

Beyond the Hype: Challenges of Neural Networks as Applied to Social Networks , Anthony Hernandez

Privacy-Preserving and Functional Information Systems , Thang Hoang

Managing Off-Grid Power Use for Solar Fueled Residences with Smart Appliances, Prices-to-Devices and IoT , Donnelle L. January

Novel Bit-Sliced In-Memory Computing Based VLSI Architecture for Fast Sobel Edge Detection in IoT Edge Devices , Rajeev Joshi

Edge Computing for Deep Learning-Based Distributed Real-time Object Detection on IoT Constrained Platforms at Low Frame Rate , Lakshmikavya Kalyanam

Establishing Topological Data Analysis: A Comparison of Visualization Techniques , Tanmay J. Kotha

Machine Learning for the Internet of Things: Applications, Implementation, and Security , Vishalini Laguduva Ramnath

System Support of Concurrent Database Query Processing on a GPU , Hao Li

Deep Learning Predictive Modeling with Data Challenges (Small, Big, or Imbalanced) , Renhao Liu

Countermeasures Against Various Network Attacks Using Machine Learning Methods , Yi Li

Towards Safe Power Oversubscription and Energy Efficiency of Data Centers , Sulav Malla

Design of Support Measures for Counting Frequent Patterns in Graphs , Jinghan Meng

Automating the Classification of Mosquito Specimens Using Image Processing Techniques , Mona Minakshi

Models of Secure Software Enforcement and Development , Hernan M. Palombo

Functional Object-Oriented Network: A Knowledge Representation for Service Robotics , David Andrés Paulius Ramos

Lung Nodule Malignancy Prediction from Computed Tomography Images Using Deep Learning , Rahul Paul

Algorithms and Framework for Computing 2-body Statistics on Graphics Processing Units , Napath Pitaksirianan

Efficient Viewshed Computation Algorithms On GPUs and CPUs , Faisal F. Qarah

Relational Joins on GPUs for In-Memory Database Query Processing , Ran Rui

Micro-architectural Countermeasures for Control Flow and Misspeculation Based Software Attacks , Love Kumar Sah

Efficient Forward-Secure and Compact Signatures for the Internet of Things (IoT) , Efe Ulas Akay Seyitoglu

Detecting Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure via Cough and Wheezing Sounds Using Smart-Phones and Machine Learning , Anthony Windmon

Toward Culturally Relevant Emotion Detection Using Physiological Signals , Khadija Zanna

Theses/Dissertations from 2019 2019

Beyond Labels and Captions: Contextualizing Grounded Semantics for Explainable Visual Interpretation , Sathyanarayanan Narasimhan Aakur

Empirical Analysis of a Cybersecurity Scoring System , Jaleel Ahmed

Phenomena of Social Dynamics in Online Games , Essa Alhazmi

A Machine Learning Approach to Predicting Community Engagement on Social Media During Disasters , Adel Alshehri

Interactive Fitness Domains in Competitive Coevolutionary Algorithm , ATM Golam Bari

Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy , Abhishek Bhattacharjee

A Communication-Centric Framework for Post-Silicon System-on-chip Integration Debug , Yuting Cao

Authentication and SQL-Injection Prevention Techniques in Web Applications , Cagri Cetin

Multimodal Emotion Recognition Using 3D Facial Landmarks, Action Units, and Physiological Data , Diego Fabiano

Robotic Motion Generation by Using Spatial-Temporal Patterns from Human Demonstrations , Yongqiang Huang

A GPU-Based Framework for Parallel Spatial Indexing and Query Processing , Zhila Nouri Lewis

A Flexible, Natural Deduction, Automated Reasoner for Quick Deployment of Non-Classical Logic , Trisha Mukhopadhyay

An Efficient Run-time CFI Check for Embedded Processors to Detect and Prevent Control Flow Based Attacks , Srivarsha Polnati

Force Feedback and Intelligent Workspace Selection for Legged Locomotion Over Uneven Terrain , John Rippetoe

Detecting Digitally Forged Faces in Online Videos , Neilesh Sambhu

Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses , Dakun Shen

Advanced Search

  • Email Notifications and RSS
  • All Collections
  • USF Faculty Publications
  • Open Access Journals
  • Conferences and Events
  • Theses and Dissertations
  • Textbooks Collection

Useful Links

  • Rights Information
  • SelectedWorks
  • Submit Research

Home | About | Help | My Account | Accessibility Statement | Language and Diversity Statements

Privacy Copyright

University Library, University of Illinois at Urbana-Champaign

University of Illinois Library Wordmark

Electrical and Computer Engineering Research Resources: Find Articles & Papers

  • Find Articles & Papers
  • High-Impact Journals
  • Standards & Technical Reports
  • Patents & Government Documents
  • E-Books & Reference
  • Dissertations & Theses
  • Additional Resources

Engineering Easy Search

University library search engines.

  • Grainger Engineering Library Homepage With specialized searches for Engineering and the Physical Sciences.
  • Easy Search The easiest way to locate University Library resources, materials, and more!
  • Find Online Journals Search by title or by subject to view our subscription details, including date ranges and where you can access full text.
  • Journal and Article Locator Finds electronic or print copy of articles by using a citation.

Engineering Article Databases

  • Engineering Village This link opens in a new window Search for articles, conference paper, and report information in all areas of engineering. Full-text is often available through direct download.
  • Scopus This link opens in a new window Search periodicals, conference proceedings, technical reports, trade literature, patents, books, and press releases in all engineering fields. Some full-text available as direct downloads.
  • Web of Science (Core Collection) This link opens in a new window Search for articles in science and engineering. Also provides Science Citation Index that tracks citations in science and technical journals published since 1981. Journal Citation Reports are also available through ISI.

Electrical & Computer Engineering

  • ACM Digital Library This site provides access to tables of contents, abstracts, reviews, and full text of every article ever published by ACM and bibliographic citations from major publishers in computing.
  • ENGnetBASE A collection of best-selling engineering handbooks and reference titles. Includes access to sub-collections: CivilENGINEERINGnetBASE, ElectricalENGINEERINGnetBASE, GeneralENGINEERINGnetBASE, IndustrialENGINEERINGnetBASE, MechanicalENGINEERINGnetBASE, MiningENGINEERINGnetBASE.
  • IEEE Xplore Provides full-text access to IEEE transactions, IEEE and IEE journals, magazines, and conference proceedings published since 1988, and all current IEEE standards; brings additional search and access features to IEEE/IEE digital library users. Browsable by books & e-books, conference publications, education and learning, journals and magazines, standards and by topic. Also provides links to IEEE standards, IEEE spectrum and other sites.
  • INSPEC Database providing access to bibliographic citations and abstracts of the scientific and technical literature in physics, electrical engineering, electronics, communications, control engineering, computers and computing, information technology, manufacturing and production engineering. Material covered includes journal articles, conference proceedings, reports, dissertations, patents and books published around the world.
  • Microelectronics Packaging Materials Database (MPMD) The MPMD database contains data and information on thermal, mechanical, electrical and physical properties of electronics packaging materials. Available in a Web-based format. The database is continually updated and expanded.
  • SPIE Digital Library Contains full-text papers on optics and photonics from SPIE journals and proceedings published since 1990. Approximately 15,000 new papers will be added each year.

Subject Guide

Profile Photo

Ask a Librarian

  • Next: High-Impact Journals >>
  • Last Updated: Jun 16, 2023 9:35 AM
  • URL: https://guides.library.illinois.edu/ece

International Journal of Computer Engineering in Research Trends

Welcome to the International Journal of Computer Engineering in Research Trends (IJCERT). As a leading peer-reviewed, open-access journal, we specialize in disseminating innovative research in computer science engineering and related disciplines. Our focus encompasses a wide range of topics, including but not limited to computer architecture, networks, software engineering, information security, artificial intelligence, machine learning, data science, robotics, cyber-physical systems, and the Internet of Things.

IJCERT is an indispensable resource for both seasoned researchers and emerging scholars in the realm of computer science and engineering. We take pride in publishing top-tier research that significantly advances the field. Our journal serves as a dynamic platform for discovering emerging research trends and connecting with fellow professionals.

Our commitment at IJCERT extends beyond publication. We strive to push the frontiers of research in computer engineering and allied areas. Our meticulous, peer-reviewed process ensures the dissemination of only the most impactful and relevant studies, offering our readership reliable and authoritative content. Being an open-access journal amplifies the reach and influence of the research we feature, making it universally accessible.

We offer numerous advantages to our contributors, including comprehensive author support, indexing services post-publication, and the provision of digitally watermarked e-certificates. At the heart of our mission lies the drive to cultivate collaboration and innovation in computer engineering and adjacent fields. Our goal is to significantly contribute to the enrichment of knowledge and foster the development of groundbreaking ideas and technologies.

In summary, IJCERT stands as a beacon of excellence in the scholarly landscape, committed to elevating research, fostering collaboration, and furthering advancements in computer engineering and related disciplines.

Journal Details

Geographical Distribution of Authors:

Afghanistan, Albania, Angola, Bahrain, Bangladesh, Bolivia, Brazil, China, Denmark, Ethiopia, Greece, India, Indonesia, Iran, Iraq, Ireland, Jamaica, Kenya, Kuwait , Malaysia, Nepal, Nigeria, Pakistan, the Philippines, Saudi Arabia, Singapore, South Africa, Turkey, the United Arab Emirates, the United Kingdom, and the United States

Editorial Geographical Distribution:

India, Egypt, Turkey, Malaysia, Canada, Iran, Algeria, China, Nigeria, the Kingdom of Saudi Arabia, and Pakistan

Editorial Contribution Percentage in Articles Per Year:   28%

Aim and scope

The primary objective of our journal is to serve as a scholarly platform and a key reference point for the broad dissemination of research findings that elevate learning, teaching, and research in the areas of computer science, engineering, and related fields. We are dedicated to uniting a diverse community of researchers, academicians, professionals, scholars, and students from various related disciplines and technological domains.

Policy of the Journal

Our journal is committed to publishing original, high-quality research papers that encapsulate the most recent and significant developments in computer science engineering and its allied disciplines. Emphasizing originality and academic rigor, we ensure that each article we publish contributes meaningfully to the field.

A key aspect of our policy is to enhance the global visibility and citation impact of the research we feature. To achieve this, all published articles are submitted to well-respected research indexing databases. This approach not only broadens the reach of our authors' work but also integrates it into the broader scholarly conversation, fostering greater engagement and dissemination within the scientific community.

IJCERT stands as a globally recognized, rapidly expanding scientific research journal, renowned for its trustworthiness and leadership in the field. We are proudly accredited by the National Science Library (NSL), a part of the National Institute of Science Communication and Information Resources (NISCAIR), under the esteemed Council of Scientific and Industrial Research in New Delhi, India. This approval underscores our commitment to maintaining the highest standards in scientific publishing and research dissemination

Important Notice

To maintain the integrity and quality of our publication, we urge all authors, conference coordinators, conveners, and guest editors to rigorously verify the originality of their manuscripts before submission to the International Journal of Computer Engineering in Research Trends (IJCERT). It is essential to ensure that submissions are not concurrently under consideration by other journals or have been previously published.

In cases where a submission is found to be a duplicate, contains fabricated data, or is plagiarized at any stage of the review or publication process, IJCERT will enforce strict actions, including:

  • • Immediate rejection of the implicated manuscript.
  • • Prohibition of future submissions by the author(s) involved to IJCERT.
  • • Formal notification to the affiliated institution's head.
  • • Circulation of blacklisted authors among editors-in-chief of leading journals.
  • We employ Turnitin, a globally recognized plagiarism detection tool, to screen submissions for plagiarism. While previously articles found plagiarized were only rejected, we are now compelled to adopt more stringent measures in response to ethical violations by a minority of authors. These instances of misconduct not only consume substantial time and resources but also hinder the journal's ability to process and publish legitimate research.

We appreciate your cooperation in upholding the high standards of academic integrity that IJCERT represents.

The publisher and the editorial team of the journal assume no responsibility for instances of plagiarism or any other ethical issues that may arise in any published article. The responsibility for the content, including the ideas and viewpoints expressed, rests solely with the respective author(s) of the article. It is imperative that authors uphold the highest standards of academic integrity and rigor in their work, as the publisher and editorial team focus on facilitating the dissemination of research and do not partake in the creation or validation of the article's content.

Current Issue

Vol. 11 No. 4 (2024): April (2024) Issue

Published: 2024-04-28

Research Articles

research paper about computer engineering

Dynamic Spam Detection in Social Networks: Leveraging Convex Nonnegative Matrix Factorization for Enhanced Accuracy and Scalability

research paper about computer engineering

Towards a Greener Tomorrow: The Role of Data Science in Shaping Sustainable Farming Practices

Exploring and expanding new directions of inquiry

A unique and robust research environment

At Michigan, faculty and students in CSE have the unique opportunity to collaborate with peers from across 19 highly-acclaimed schools and colleges to conduct impactful, broad ranging, and highly interdisciplinary research.

research paper about computer engineering

Resources at the University include leading schools of medicine, business, information, art, engineering, and public policy; facilities such as high performance computing clusters and the Mcity test facility for autonomous vehicle testing; institutes of robotics and data science; initiatives in precision health and biosciences; and more. CSE researchers also have long-standing relationships with industrial partners.

robot vehicle

Research areas

Our 12 key areas of research reflect the depth and pervasiveness of modern computing.

CSE research areas >

bluetooth device

Labs and centers

Explore CSE’s five labs and numerous faculty and affiliated research centers.

CSE labs and centers >

students in lab

Undergraduate research

About 150 undergraduate students conduct research on EECS faculty projects in a typical year.

See the opportunities >

Banner

Computer Engineering: Articles & Journals

  • Articles & Journals
  • Books & Ebooks
  • Standards & Patents
  • Citing & Writing Help
  • Using AI in Research This link opens in a new window

Journal Title Abbreviations

  • All that JAS (Journal Abbreviations Sources)
  • Web of Science Journal Title Abbreviations list shows the abbreviations used for journal titles as cited works

Find Articles in Research Databases

  • Recommended databases
  • Consider these, also
  • OneSearch  
  • Google Scholar
  • What is peer review?

How-to instructions

Depending on your topic, these databases also may be relevant.

Selected full text articles from journals in a wide range of subjects, plus magazines, reports, books, and more

Selected full text articles from journals, magazines, conference proceedings, and more

Database free on the web

Selected full text articles from journals, trade, and popular magazines covering scientific and technical fields

Advanced Search

Sample search:    "critical thinking" AND "higher education"    (race OR racial) AND (discriminat* OR prejudic*) Select limiters (articles from scholarly publications, etc.) on results screen

While it doesn't offer some of the sophisticated options available in research databases, Google Scholar can be helpful. See instructions for customizing Google Scholar to provide Full Text @ UHCL links in results.

Google Scholar Search

A peer-reviewed (or refereed ) journal:

  • uses  experts from the same subject field or profession as the author to evaluate a manuscript prior to acceptance for publication
  • has articles that report on research studies or provide scholarly analysis of topics
  • may include book reviews, editorials, or other brief items that are not considered scholarly articles
  • Anatomy of a Scholarly Article Explains key elements from the first & last page of a typical scholarly or academic article. North Carolina State Univ. Libraries

Peer Review in 3 Minutes

(3:15) Explains the academic publishing process for research articles and scholarly journals, including the quality control process of peer review. North Carolina State Univ. Libraries

Get Full Text for an Article

If a database lacks immediate full text, click Find It @ UHCL  in results to check for full text from another source. Follow Available Online links in OneSearch to a resource with full text for UH Clear Lake users as shown below.

Shows Find It at UHCL leading to full text in EBSCOhost PsycARTICLES

If full text is not found, submit an article request .

  • Request a book, article, or other item ILLiad Interlibrary Loan logon

PDF

Other Sources

Links to reliable websites and research guides.

  • TechRepublic: Research Library Includes webcasts, white papers, file downloads and more with information on various aspects of technology. Also has blogs and forums.
  • CompInfo The Computer Information Center One-stop reference resource for corporate IT, computer software, computers, and communication.
  • The Virtual Library: Electrical and Electronics Engineering The WWW Virtual Library (VL) is the oldest catalogue of the Web, started by Tim Berners-Lee, the creator of HTML and of the Web itself. It is run by a loose confederation of volunteers, who compile pages of key links for areas in which they are expert. The VL pages are widely recognised as being amongst the highest-quality guides to particular sections of the Web.
  • WWW Computer Architecture Page University of Wisconsin page with links to tools, conferences, people and organizations in Computer Architecture.
  • << Previous: Home
  • Next: Books & Ebooks >>
  • Last Updated: Feb 28, 2024 10:46 AM
  • URL: https://uhcl.libguides.com/CENG
  • How it works

Useful Links

How much will your dissertation cost?

Have an expert academic write your dissertation paper!

Dissertation Services

Dissertation Services

Get unlimited topic ideas and a dissertation plan for just £45.00

Order topics and plan

Order topics and plan

Get 1 free topic in your area of study with aim and justification

Yes I want the free topic

Yes I want the free topic

Computing Engineering Dissertation Topics

Published by Jamie Walker at January 10th, 2023 , Revised On August 18, 2023

Over a period of time, dissertations have become an inherent component of higher education studies. They are not only entrenched within the master or a PhD. Degree but also in undergraduate programmes. Computer engineering dissertations allow the researchers to choose a topic of particular interest to them and research further into the topic to add to the current body of literature.

However, choosing a topic from an extensive list of topics is always easier than working on the first topic you find interesting.

To help you get started with brainstorming for computer topic ideas, we have developed a list of the latest computer engineering dissertation topics that can be used for writing your computer engineering dissertation.

These topics have been developed by PhD-qualified writers of our team , so you can trust to use these topics for drafting your dissertation.

You may also want to start your dissertation by requesting  a brief research proposal  from our writers on any of these topics, which includes an  introduction  to the problem,  research questions , aim and objectives ,  literature review  along with the proposed  methodology  of research to be conducted.  Let us know  if you need any help in getting started.

Check our  example dissertations  to get an idea of  how to structure your dissertation .

You can review step by step guide on how to write your dissertation  here.

View our free dissertation topics database.

Computer Engineering Dissertation Topics

Computers are the greatest innovation of the modern era and have done wonders for mankind. There is only one language that computers understand; the binary. But there are various high-level coding languages that even computers do not understand and therefore use a compiler for translation.

Computing refers to computer hardware or software coding development technology and covers all aspects of computer technologies. It is the practical and scientific study of the implementation of computing information. Computing is also interchangeably known as computer sciences.

A computing engineer or a computer scientist specializes in practical work, the theory of computing, and the design of computational systems. Essentially, it is the study of structure, expression, mechanization, and feasibility of algorithms (logical procedures) that cause processing, communication, representation, access of information, and acquisition in a computer. This area has a wide range of topics, some of which have been listed below:

  • Risk calculation in the application and development process.
  • Generation of the java application.
  • Implementing a behavioural based approach to detect cheating in online games.
  • Analysis of coding environment of different applications.
  • Identification of different languages used for coding.
  • Identification of stake holder’s interest in App development process.
  • Role of visualization in complex hierarchal structures of computing.
  • Analysing the requirements of Inventory Management Software.
  • Development of single-player simulation game.
  • Investigation of web teaching aid system.
  • Development of online based library management system.
  • Implementation of Electronic banking system.

2022 Computing Engineering Dissertation Topics

Topic 1: an investigation of the blockchain's application on the energy sector leading towards electricity production and e-mobility..

Research Aim: This study aims to investigate the applications of blockchain within the energy sector. This study will identify how blockchain can be used to produce electricity from the comfort of home. Moreover, this study aims to introduce the concept of e-mobility through blockchain, according to which blockchain can be used to share the car ride with the other commuters residing at nearby places. Another objective of this research is to develop a framework that could assess blockchain’s use for the consumers staying within a budget and letting them assess how much money they have been spending so far.

Topic 2: Investigating the Issues that Impact Data Security in Cloud-Based Blockchain Technology: An Global Tourism Industry Case Study

Research Aim: This research focuses on a significant shift in trend found in the worldwide tourist business, which is the usage of the cloud for data and services. It attempts to supply the requirements for this implementation owing to the demand for ease, saving, and improved service providing. Furthermore, it will also focus on the limits of traditional blockchain technology primitives and assess control models. These constraints are related to security issues involving data in a cloud environment in the global tourism industry.

Topic 3: Is Digital Technology overtaking Human Interactions in the Medical Fields? An Examination of the Use of Computational biology and Machine Leaning in Patient Diagnosis and Treatment.

Research Aim: The current study seeks to examine how digital technology is replacing human interactions in the medical industry in the importance of computational biology and machine learning in patient diagnosis and treatment. This study will set forth the theoretical foundations and significance of computational biology and machine learning and will also make recommendations for further enhancement.

Topic 4: Evaluating the use of databases and information retrieval systems in the perspective of the United States National security policy.

Research Aim: The current study aims to evaluate the use of databases and information retrieval systems from the perspective of United States national security policy. This study addresses the databases and information retrieval system to provide a clear understanding. It will also focus on specific elements d criteria in the united state’s national security and highlights the benefits and drawbacks of employing them to enhance national security strategy in the united states.

Topic 5: Development of growing infusion of computer technology in the area of medicine- examining NHS policies.

Research Aim: This research aims to examine the development of the growing infusion of computer technology in the area of medicine by evaluating existing NHS policy. The study will provide a theoretical framework for the application of computer science technologies in medicine and will also set out the benefits of using contemporary computer technology as well as analyse the drawbacks that have occurred as a result of the growth of this new technology in this field. It will also focus on the policies employed by NHS to assist the development of technologies in the UK healthcare sector.

Computer Engineering Dissertation Topics for 2021

A 3-d visualization system for ultrasound images.

Research Aim: This research will focus on the visualization of 3-D ultrasound images and their medical therapy benefits.

Reliable and realistic study of remote communication systems in telephony and multipath faded systems

Research Aim: This research’s primary emphasis is on telephony’s practical implementation in a remote communication system.

Establishing a Neural Network Device

Research Aim: In terms of energy efficiency, the human brain is much greater than any modern supercomputer. A whole new generation of energy-efficient, brain-like computers is being designed for this study.

Methods for Artifact EEG Brain function study, caused by sugar, salt, fat, and their replacements

Research Aim: This study relies on the procedure for calculating sweetness taste is developed and validated. Part of the project includes modern electrode technologies to capture the purest possible brain signal from EEG equipment.

Find 100s of dissertation topics in your other academic subjects in our free topics database.

The impact of Covid-19 on tech spends in 2021

Research Aim: This research aims to study the impact of Covid-19 on tech spends in 2021.

Analysis of information system built for e-learning

Research Aim: This research aims to analyze the information system built for e-learning

Advantages and disadvantages of an information system

Research Aim: This research aims to address the advantages and disadvantages of an information system.

Covid-19 Computer Engineering Research Topics

Research to study the effects of coronavirus on it industries.

Research Aim: This research will focus on the impacts of COVID-19 on the growth of IT industries highlighting the issues responsible for it and the possible solutions to overcome them.

Research to identify the impact of Coronavirus on the computer science research community

Research Aim: Coronavirus has infected thousands of people and has been responsible for the deaths of several innocent people worldwide. This study will focus on identifying the effects of this pandemic on the computer science research community.

Research to study the impacts of COVID-19 on tech spends in 2021

Research Aim: As a result of COVID-19, the economy of the entire world has been disrupted. The purpose of this research is to know the tech expenditures after COVID-19 became widespread. How are the tech industries dealing with the challenging situation created by COVID-19?

Research to identify the contribution of computer science to control the spread of Coronavirus pandemic

Research Aim: This research aims at identifying the contributions and efforts made by computer engineers to control the pandemic. What is the role of computer scientists during the pandemic?

Research to identify the unemployment of computer engineers after the Coronavirus pandemic

Research Aim: This research will focus on identifying the increased unemployment issues raised after the COVID-19 pandemic and finding out the possible solutions to overcome the reduced unemployment of computer engineers.

Hardware, Network and Security Dissertation Topics

Network security is very crucial for any organisation. It is dependent upon a well-managed network through the implementation of policies drafted by network administrators to manage the access of the organisational information. Network security provides stability, safety, integrity, reliability, and utility of data and network.

It works efficiently with the latest hardware equipment and updated software. Network security offers many advantages to businesses, such as protection against any disruption to keep employees motivated, energetic, regular, and productive.

In certain instances, a virus may break into the network security. However, the network administrator generally uses an anti-virus program to prevent this sort of attack.

Therefore, it will be fair to say that network security plays a vital role in maintaining a business’s reputation and operations which is the most important asset to any organisation. Below is a list of topics that you can base your dissertation on:

  • Performance analysis of transmission control protocol over Ethernet LAN.
  • Gateway usage for the intrusion detection system.
  • Impact of security machinimas in online transactions.
  • Investigation of smart card specification.
  • Importance of router placement in the network.
  • Level of customer’s trust in E-banking.
  • Role of antivirus in a shared network.
  • Application of database technologies for data network management.
  • Network worm: A headache to networking.
  • Implementation of various tools in programming language.
  • Study of retroactive data structures.
  • Role of Voice over Internet Protocol over Ethernet LAN.
  • The usefulness of data transfer security over Wi-Fi Network.
  • Influence of signal strength of Wi-Fi upon data transfer.
  • Analysis of tree inclusion complexities.
  • Analysis of the implementation of the set procedure.
  • Analysis of the application of programming tools.
  • Implementation of File Sharing System in Network.
  • Study of virus behaviours in the secured programming environment.
  • Investigation of issues of user’s security and data protection over the network.
  • Benefits of network security to customers.
  • Improvements of mobile data service for future usage.
  • Study of Asymmetry k-center variant.
  • Analysis of issues in emerging 4G networks.
  • Role of dynamic proxies in a mobile environment to support Remote method Invocation.

Software, Programming and Algorithm Dissertation Topics

In layman language, the software is collectively known as the “combination of operating information and all the programs that are being used by the computer.” It is a set of instructions to direct computers to perform a specific task depending upon thususer’s instructions.

The software can be written in both high and low-level languages. Low-level language is also known as machine code and is faster because it doesn’t require any compiler and directly communicates with the computer. A high-level language is pretty similar to a human language, and therefore can be easily understood by the developers. High-level language requires the compiler to translate commands to the computer.

Programming and algorithms can be termed as commands given to the computer to perform actions. Programming leads to executable programs from a computing problem and involves developing, generating, and analysing algorithms. Algorithms refer to an act done involving a step-by-step process to solve a problem. It is a set of logic written in software.

There are two types of software; operating software that helps in operation and system software necessary to run a system. Operating software can be rewritten and changed according to demand, but system software cannot be altered. If developers require any alterations, they would have to develop new software.

There are various topics that can be considered for  research dissertation purposes  under this theme, a list of which is given below.

  • Application of algorithms.
  • Importance of approximation algorithms on graphs.
  • Critical analysis of data structures on trees.
  • Evaluation and implementation of new algorithms.
  • System software: A link to communicate hardware.
  • Difference between binary dispatching and multiple dispatching.
  • Analysis of plan sweep techniques.
  • Investigation of software support to drivers of devices.
  • Intelligent interface for database systems.
  • Analysis of function and types of union-find.
  • The usefulness of different coding languages.
  • Application of basic hardware knowledge and math skills.
  • Analysis of the design of converter based on new moduli.
  • Analysis of information travelling via software.
  • Evaluation and implementation of heuristic algorithms.
  • Development of applications using Java.
  • Analysis of fault tolerance in a network by using simulation.
  • Importance of system software for computers.
  • Effects of larger integer module operations.
  • Consequences of wrong commands in coding.
  • Investigation of the coding language of system software.
  • Analysis of feasibility environment of platform.
  • Evaluation of heuristic algorithms for generating clusters.
  • Critical analysis of fixed control variable.
  • Analysis of design of converter with large dynamic range.
  • Ways to recover corrupted software.
  • Analysis of fault tolerance of sorting network.
  • Analysis of the difference between LAN and WAN.
  • Development of an algorithm for a one-way hashing system.
  • Relation between dynamic access and fixed values.
  • Importance of right language selection while coding.
  • Study of optimization problems.
  • Analysis of security frameworks for web services.
  • Investigating algorithms techniques.
  • Partial persistence of algorithms vs others.
  • Study of time and space problems of algorithmic functions.
  • Effects of linear and logarithmic factors over programming.
  • Discussion about union-find with deletion.
  • Importance of data structure for bridge core problems.
  • Consequences of fault in interconnected networks.
  • Difference between rooted and unrooted tree.

Information Systems Dissertation Topics

Information systems refer to a group of people and computers that are being used for the interpretation of all kinds of information. Computer-based information systems are a very interesting topic for research. It includes all information regarding decision making, management support, and operations and can also be used to access the database.

There is an obvious difference between computer systems, information systems, and business processes. The information system provides the tools to manage businesses successfully.

An information system can be said to be a workstation where humans and machines work together towards the success of a business. One such example is Wal-Mart. The company is entirely based on information systems and has connected its suppliers, vendors, customers and together.

It deals with a large number of data and consists of hardware, software, network, and telecommunications of the operation. Below is a list of research topics in the field of information systems for you to base your dissertation  on:

  • Analysis of challenges in building information systems for any organisation.
  • Impact of cyberinfrastructure on the customer.
  • Role of information system in scientific innovations.
  • The usefulness of information systems for businesses.
  • Advantages of information systems.
  • Access to information systems by employees anywhere in the world.
  • Preparation of a database management system.
  • Analysis and solution of database management systems.
  • Study of support of information system to hardware.
  • Managing information systems of big stores, The case of Walmart.
  • Analysis of information system built for E-learning.
  • Critical analysis of the changing nature of the web.
  • Role of information system in decision making of disruptions.
  • Examine customer response through the information system.
  • Investigate the impact of a virus in the network
  • Relationship between I.T education and an organization.
  • Role of information system in global warming.
  • Investigate the reason for adopting green information systems.
  • Analysis of the between social networks and information systems.
  • Role of information system in dealing with complex business problems.

Important Notes:

As a computing engineering student looking to get good grades, it is essential to develop new ideas and experiment with existing computing engineering theories – i.e., to add value and interest in your research topic.

The field of computing engineering is vast and interrelated to so many other academic disciplines like civil engineering , finance , construction ,  law ,  healthcare , mental health , artificial intelligence , tourism , physiotherapy , sociology , management , marketing and nursing . That is why it is imperative to create a project management dissertation topic that is articular, sound, and actually solves a practical problem that may be rampant in the field.

We can’t stress how important it is to develop a logical research topic; it is the basis of your entire research. There are several significant downfalls to getting your topic wrong; your supervisor may not be interested in working on it, the topic has no academic creditability, the research may not make logical sense, there is a possibility that the study is not viable.

This impacts your time and efforts in  writing your dissertation  as you may end up in the cycle of rejection at the very initial stage of the dissertation. That is why we recommend reviewing existing research to develop a topic, taking advice from your supervisor, and even asking for help in this particular stage of your dissertation.

While developing a research topic, keeping our advice in mind will allow you to pick one of the best computing engineering dissertation topics that fulfill your requirement of writing a research paper and add to the body of knowledge.

Therefore, it is recommended that when finalizing your dissertation topic, you read recently published literature to identify gaps in the research that you may help fill.

Remember- dissertation topics need to be unique, solve an identified problem, be logical, and be practically implemented. Take a look at some of our sample computing engineering dissertation topics to get an idea for your own dissertation.

How to Structure your Dissertation on Computing Engineering

A well-structured   dissertation can help students   to achieve a high overall academic grade.

  • A Title Page
  • Acknowledgements
  • Declaration
  • Abstract: A summary of the research completed
  • Table of Contents
  • Introduction : This chapter includes the project rationale, research background, key research aims and objectives, and the research problems to be addressed. An outline of the structure of a dissertation  can also be added to this chapter.
  • Literature Review :  This chapter presents relevant theories and frameworks by analysing published and unpublished literature available on the chosen research topic, in light of  research questions  to be addressed. The purpose is to highlight and discuss the relative weaknesses and strengths of the selected research area whilst identifying any research gaps. Break down of the topic, and key terms can have a positive impact on your dissertation and your tutor.
  • Methodology:  The  data collection  and  analysis  methods and techniques employed by the researcher are presented in the Methodology chapter which usually includes  research design,  research philosophy, research limitations, code of conduct, ethical consideration, data collection methods and  data analysis strategy .
  • Findings and Analysis:  Findings of the research are analysed in detail under the Findings and Analysis chapter. All key findings/results are outlined in this chapter without interpreting the data or drawing any conclusions. It can be useful to include  graphs , charts, and   tables in this chapter to identify meaningful trends and relationships.
  • Discussion  and  Conclusion: The researcher presents his interpretation of results in this chapter, and states whether the research hypothesis has been verified or not. An essential aspect of this section of the paper is to draw a linkage between the results and evidence from the literature. Recommendations with regards to implications of the findings and directions for the future may also be provided. Finally, a summary of the overall research, along with final judgments, opinions, and comments, must be included in the form of suggestions for improvement.
  • References:  This should be completed in accordance with your University’s requirements
  • Bibliography
  • Appendices:  Any additional information, diagrams, graphs that were used to  complete the  dissertation  but not part of the dissertation should be included in the Appendices chapter. Essentially, the purpose is to expand the information/data.

About ResearchProspect Ltd

ResearchProspect is a  UK-based academic writing service that provides help with  Dissertation Proposal Writing ,  Ph.D. Proposal Writing ,  Dissertation Writing ,  Dissertation Editing and Improvement .

For further assistance with your dissertation, take a look at our full dissertation writing service .

Our team of writers is highly qualified. Our writers are experts in their respective fields. They have been working in the industry for a long time. Thus they are aware of the issues and the trends of the industry they are working in.

Need more Topics.?

Free Dissertation Topic

Phone Number

Academic Level Select Academic Level Undergraduate Graduate PHD

Academic Subject

Area of Research

Frequently Asked Questions

How to find dissertation topics about computing engineering.

To find computing engineering dissertation topics:

  • Explore emerging technologies.
  • Investigate industry challenges.
  • Review recent research papers.
  • Consider AI, cybersecurity, IoT.
  • Brainstorm software/hardware innovations.
  • Select a topic aligning with your passion and career aspirations.

You May Also Like

If you have aimed to write your dissertation about leadership and direly looking for some exceptional leadership research topics, do not worry; we have got your back.

Need interesting and manageable Effects of Social Media on the Youth dissertation topics? Here are the trending Effects of Social Media on the Youth dissertation titles so you can choose the most suitable one.

The topic of dementia nursing is still unfamiliar to many healthcare professionals and individuals despite the availability of so many resources online. Despite the fact that it is one of the most fulfilling careers.

USEFUL LINKS

LEARNING RESOURCES

researchprospect-reviews-trust-site

COMPANY DETAILS

Research-Prospect-Writing-Service

  • How It Works

School of Electrical and Computer Engineering

College of engineering, pioneering research on wirelessly powered backscatter communications receives top recognition.

Photo of the researchers in front of the Atlanta skyline

Three members of the award-winning team (L-R): Professor Manos M. Tentzeris, Aline Eid, and Jimmy G. D. Hester. Eid and Hester are holding inkjet-printed prototypes of an mm-wave harvester developed by Tentzeris’ ATHENA research group.

The research paper " Advances in Wirelessly Powered Backscatter Communications: From Antenna/RF Circuitry Design to Printed Flexible Electronics " has received the distinguished  2023 Best Paper Award from a leading technical journal, underscoring its significant contributions to the field.

The article was published in " Proceedings of the IEEE ," vol. 110, no. 1, pp. 171-192 in January 2022.

The award-winning team includes former members of Professor  Emmanouil (Manos) Tentzeris ’ ATHENA research group, as well as researchers from  Heriot-Watt University in Edinburgh, U.K. Tentzeris is currently the Ed and Pat Joy Chair in Antennas in the Georgia Tech School of Electrical and Computer Engineering .

The winning paper explores battery-free backscatter communications, a burgeoning technology poised to redefine the landscape of 6G, IoT, and massive machine-type communications (mMTC). Offering an exposition of foundational theories and pragmatic insights into the deployment of backscatter radio networks and transceivers, the paper shows a path towards realizing the full potential of this transformative technology.

It covers a wide spectrum of critical aspects, including semiconductor chips, antennas, power circuits, communication modules, waveform design, channel optimization, material innovation, and additive manufacturing. As the first comprehensive review paper addressing these pivotal subjects, it offers novel perspectives and insights into the interdisciplinary nature of low-power, sustainable, and cost-effective devices and systems for backscatter communication technology.

“This remarkable paper provides an insightful review of the rapidly evolving fields of wireless power transfer and flexible electronics in the context of battery-free backscatter communications,” said Tentzeris. “We're excited about the possibilities this technology opens up, envisioning a future where networks of these devices work together intelligently and sustainably, creating new opportunities in various fields.”

The “Proceedings of the IEEE” Best Paper Award, which is bestowed upon exceptional survey, review, or tutorial papers published within the journal in the preceding three years, celebrates works of broad significance and profound potential impact.

“Proceedings of the IEEE” is a world renown journal with a very high impact factor (IF=20.6) encompassing contributions from all IEEE societies providing comprehensive coverage of technical advancements in electronics, electrical engineering, and computer science. 

The research team:

Georgia Tech

  • Manos M. Tentzeris, Professor and Ed and Pat Joy Chair in Antennas
  • Aline Eid, Ph.D. Alumni from ATHENA lab, currently Assistant Professor with the University of Michigan, Ann Arbor
  • Jimmy G. D. Hester, Ph.D. Alumni from ATHENA lab, currently CTO of Atheraxon, Inc.
  • Xuanke He, Ph.D. Alumni from ATHENA lab, currently with Apple
  • Ryan Bahr, Ph.D. Alumni from ATHENA lab, currently with Apple

Heriot-Watt

  • Chaoyun Song, Associate Professor
  • Yuan Ding, Associate Professor
  • Apostolos Georgiadis, Associate Professor
  • George Goussetis, Professor 

Related Articles

Headshot of Manos Tentzeriz

Tentzeris Appointed Inaugural Ed and Pat Joy Chair in Antennas

The ECE professor is recognized for his contributions to wireless communications encompassing additively manufactured antenna arrays, RF modules, and wireless power transfer.

Photo of the 5g arrays

The Future of 5G+ Infrastructure Could be Built Tile by Tile

In Georgia Tech’s new approach, flexible and additively manufactured tiles are assembled onto a single, flexible underlying layer.

  • Browse Works
  • Engineering

Computer Engineering

Computer engineering research papers/topics, setswana grammar checker for declarative sentences using lstm-recurrent neural network.

Abstract: This research is aimed at developing a Setswana grammar checker for Setswana declarative sentences using Long Short-Term Memory Recurrent neural networks (LSTM-RNNs). The research was motivated by the fact that Setswana is recognized as one of the under-resourced languages in the world and the language lacks Natural language processing (NLP) tools such as grammar checkers; this delays the language’s technological progress. A Setswana grammar checker is a pre-requisite to th...

Case-based reasoning system for prediction of fuel consumption by haulage trucks in open–pit mines

Abstract: The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing fuel consumption could lead to a significant decrease in overall mining costs. Various methods have been proposed to improve fuel efficiency in open-pit mines. Case-based reasoning (CBR) can be used to estimate fuel consumption by haulage trucks. In ...

Meteorological influence on eLoran accuracy

Abstract: Stringent accuracy requirements need to be met for eLoran deployment in marine navigation and harbour entrance and approach. A good accuracy model is therefore required to predict the positioning accuracy at the user’s receiver locations. Accuracy depends on the variations of additional secondary factors (ASFs) and the primary factor delay. The changes in the air refractive index caused variations in the primary factor (PF) delay of the eLoran signal, and current eLoran accuracy ...

A Model for Providing List of Reliable Providers for Grid Computing

Abstract: Grid computing is an interconnected computer system, where machines share resources that are highly heterogeneous. Reliability is the probability that a process will successfully perform its prescribed task without any failure at a given point of time. Hence, ensuring reliable transactions plays a vital role in grid computing. The main objective of the paper is to develop a reliable and robust two way trust model for the Grid system. Thus the goals of this proposed trust model are ...

Query Processing with Respect to Location in Wireless Broadcasting

Abstract: The wireless communication involves a client server communication i.e. the client needs to send a request for performing a process; it can perform only after the response of the server. Large number of request will result the load balance in the server, which cause process delay. It has been resolved by using wireless broadcast client server communication. To communicate with server the client use fee based cellular type network to achieve a responsible operating range. For avoidin...

A preliminary application of a machine learning model for the prediction of the load variation in three-point bending tests based on acoustic emission signals

Abstract: The load variation during three-point bending (TPB) tests on prismatic Nestos (Greece) marble specimens instrumented by piezoelectric sensors is predicted using acoustic emission (AE) signals. The slope of the cumulative amplitude vs the predicted load curve is potentially useful for determining the forthcoming specimen failure as well as the indirect tensile strength of the material. The optimum artificial neural networks (ANN) model was selected based on a comparison of different...

Enhancing Personalization and Sales Conversion in E-Commerce: The Role of AI in the App Shop Experience

A shopping application that can be easily designed and built using the Flutter framework. “Shop AI” offers customers a good platform and efficient shopping experience in terms of convenience and functionality. this report focusing on the design and development framework. It explores application architecture and shows how Flutter’s versatility helps developers create cross-platform, responsive, and visually appealing user interfaces. Discover the main features of ”Shop AI” by searchi...

Algorithms and Data Structures Part 4: Searching and Sorting (Wikipedia Book 2014)

Searching 1 Search algorithm 1 Linear search 3 Binary search algorithm 6 Sorting 14 Sorting algorithm 14 Bubble sort 25 Quicksort 31 Merge sort 43 Insertion sort 52 Heapsort 59 References Article Sources and Contributors 66 Image Sources, Licenses and Contributors 68

E-Store Project Software Requirements Specification Version <4.0>

  Introduction The introduction of the Software Requirements Specification (SRS) provides an overview of the entire SRS with purpose, scope, definitions, acronyms, abbreviations, references and overview of the SRS. The aim of this document is to gather and analyze and give an in-depth insight of the complete Marvel Electronics and Home Entertainment software system by defining the problem statement in detail. Nevertheless, it also concentrates on the capabilities required by stakeholders and...

Skin Cancer Diagnostics with a Smartphone App

Melanoma is one of the deadliest types of skin cancer and can be difficult to treat when it's advanced. To reduce mortality rates, early detection is key. In order to do this, computer-aided systems have been developed to help dermatologists diagnose the condition. To make it more accessible to the public, researchers are working on creating portable, at-home diagnostic systems. An Android-based smartphone application utilizing image capture, preprocessing, and segmentation was developed to e...

Design Control and Monitoring System Of Water Distribution Networks

ABSTRACT  Nowadays, water distribution network automation is becoming more and more popular day by day due to its numerous advantages, an internet-based water distribution network system focuses on monitoring and controlling water distribution network instance. Water distribution network face wastage of water due to improper water supply management, non-monitoring in real time, this caused scarcity of water, scarcity of water consider mainly problem in cities. water distribution network auto...

2D Radar Antenna Orientation and Control

ABSTRACT The RADAR system is the first step and much more important and it has much more effect than the other step in the RADAR system works. The RADAR is used in different applications and systems, almost of these applications need high precision, and it's depending on the accuracy of RADAR ANTENNA orientation. Much research has been done and different systems designed to obtain a result within a permissible range. Design RADAR ANTENNA orientation and control system using FPGA and stepper m...

Design and Optimization of W-Tailored Optical Fiber

ABSTRACT  This research work studies the temperature effects in W-shaped core refractive index optical fiber. The work designs an optimized W-tailored optical fiber (OWTOF) that checks the effect of rising temperatures in W-tailored optical fiber (WTOF) for better communication. Initially, an introduction to the general concept of optical fibers including tailored optical fibers (TOF), temperature effects and models is presented as a background. This is followed by studies on existing litera...

Design of Digital Image Enhancement System Using Noise Filtering Techniques

ABSTRACT  Noise Reduction in digital image is one of the most important and difficult techniques in image research. The aim of Noise Reduction in digital image is to improve the visual appearance of an image, or to provide a better transform representation for another automated image processing. Many images like medical images, satellite images, aerial images and even real-life photographs suffer from viewing, removing blurring and noise, increasing contrast, etc. Reducing noise from the dig...

Design And Implementation Of An Automated Inventory Management System Case Study: Smart Shoppers Masaka

ABSTRACT The general purpose was to develop an efficient Inventory Management System (IMS) that improves service delivery at Smart shoppers’ Masaka. The main objectives were to collect and analyze user requirements that provide the researchers with enough information of what the system users want the system to accomplish, to design an Automated Inventory Management System, to implement a prototype and to test and validate the designed prototype. The methodology used includes Interviews, Que...

Projects, thesis, seminars, research papers, termpapers topics in Computer Engineering. Computer Engineering projects, thesis, seminars and termpapers topic and materials

Popular Papers/Topics

Building and assembling a computer system, digital combination lock system, design and construction of four-way traffic light, a technical report on student industrial work experience scheme (siwes) on laptop repair, microcontroller based digital code lock, design of a patient heartbeat and temperature monitor using rf, automobile battery preservative, network interconnection devices, smart card technology, design and implementation of a software intercom on lan, design &amp; construction of 8 channel buzzer using microcontroller, appliances control through sms, design and simulation of a secured wireless network (a case study of houdegbe north american university benin), microcontroller based automation system, design and implementation of an internet of things (iot) based smart waste bin for fill level monitoring and biodegradability detection.

Privacy Policy | Refund Policy | Terms | Copyright | © 2024, Afribary Limited. All rights reserved.

Help | Advanced Search

Computer Science > Artificial Intelligence

Title: crispr-gpt: an llm agent for automated design of gene-editing experiments.

Abstract: The introduction of genome engineering technology has transformed biomedical research, making it possible to make precise changes to genetic information. However, creating an efficient gene-editing system requires a deep understanding of CRISPR technology, and the complex experimental systems under investigation. While Large Language Models (LLMs) have shown promise in various tasks, they often lack specific knowledge and struggle to accurately solve biological design problems. In this work, we introduce CRISPR-GPT, an LLM agent augmented with domain knowledge and external tools to automate and enhance the design process of CRISPR-based gene-editing experiments. CRISPR-GPT leverages the reasoning ability of LLMs to facilitate the process of selecting CRISPR systems, designing guide RNAs, recommending cellular delivery methods, drafting protocols, and designing validation experiments to confirm editing outcomes. We showcase the potential of CRISPR-GPT for assisting non-expert researchers with gene-editing experiments from scratch and validate the agent's effectiveness in a real-world use case. Furthermore, we explore the ethical and regulatory considerations associated with automated gene-editing design, highlighting the need for responsible and transparent use of these tools. Our work aims to bridge the gap between beginner biological researchers and CRISPR genome engineering techniques, and demonstrate the potential of LLM agents in facilitating complex biological discovery tasks.

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Department of Computer Science and Electrical Engineering

Inspiring innovation, post-bac certificate in digital forensics.

research paper about computer engineering

Post-Baccalaureate Certificate in Professional Studies: Digital Forensics

UMBC’s cybersecurity graduate program has added a new 12-credit post-baccalaureate certificate in professional studies focused on digital forensics.

The Digital Forensics certificate program is intended for early and mid-career IT and law- enforcement professionals who want to learn basic and advanced concepts and develop skills in the field of computer forensics. Students will understand the role of digital/computer forensics as a subspecialty of cybersecurity. Through firsthand experience using industry-standard forensic tools, techniques, and procedures in the digital forensic process, students will understand the incident-handling process, the special rules of evidence that apply to cybercrime investigations (i.e., chain of custody, search and seizure, forensic imaging), and the relevant state, federal, and/or regulatory frameworks governing such activities within different industry sectors (such as defense, healthcare, and financial services). The four-course, 12-credit certificate can be applied toward obtaining the MPS in Cybersecurity degree.

  • CYBR 620 Intro to Cybersecurity or CMSC equivalent (i.e., CMSC 626, CMSC 687)
  • CYBR 641 Computer Crime Investigations
  • CYBR 642 Introduction to Digital Forensics
  • CYBR 643 Advanced Digital Forensics

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings and Information

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. Your choices will not impact your visit.

NOTE: Third-party Google scripts on this website may have access to cross-site third-party cookies under the google.com domain. We, the CSEE Department, do not access, read, or write these third-party cookies, and as a result, we do not control their presence on your browser. You may block them by using a third-party cookie blocker in your browser.

If you click Accept below to accept the general cookie consent, then a “wpgdprc-consent” cookie will be stored on your browser, to record your general consent.

If you click Accept below to accept the general cookie consent, and also have Google Analytics cookies enabled (on the sidebar to the left), the CSEE Department website will store and access Google Analytics cookies on your browser. We use the data from these cookies to collect information on website usage statistics and improve user experience. If you do not wish to allow Google Analytics cookies on your browser, then either do not click Accept on the bottom bar, or disable Google Analytics on the left.

If you log in to this website, then several Wordpress cookies and session variables will be stored on your browser. Accessing the login screen constitutes your consent to have Wordpress cookies and session variables stored on your computer.

External Scripts

The CSEE Department website makes use of several external scripts to improve user experience. These include, but are not necessarily limited to: Google Calendar, Google Analytics, and ReCAPTCHA. If you choose to use this website, then you agree to allow these scripts to be loaded and executed.

External Links

Our service may contain links to other sites. If you click on a third-party link, you will be directed to that site. Note that these external sites are not operated by us. Therefore, we strongly advise you to review the Privacy Policy of these websites. We have no control over, and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.

NOTE: These settings will only apply to the browser and device you are currently using.

Google Analytics

Enables Google Analytics.

IMAGES

  1. 32+ Research Paper Samples

    research paper about computer engineering

  2. introduction

    research paper about computer engineering

  3. (PDF) On the Theoretical Foundations of Computer Science. An

    research paper about computer engineering

  4. (PDF) Writing good software engineering research papers

    research paper about computer engineering

  5. (DOC) COMPUTER ENGINEERING PROJECT TOPICS AND MATERIAL

    research paper about computer engineering

  6. Diploma in Computer Engineering Question Papers

    research paper about computer engineering

VIDEO

  1. 2017 Spring GTU CSE 554/484 Lecture 11 May 15 00000

  2. 12th class computer science final board paper previous year paper/1_march_2024

  3. Engineering computational design in the democratisation of building

  4. Computing the Universe

  5. Computer engineering might be better than computer science

  6. 1st Puc Computer Science Mid Term Model Question Paper 2023-24, class 11 Cs Model Question Paper #cs

COMMENTS

  1. Computer Science and Engineering

    This conceptual research paper is written to discuss the implementation of the A.D.A.B model in technology -based and technical subjects such as Computer Science, Engineering, Technical and so on ...

  2. Computer Science

    Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or ...

  3. Computers and Electrical Engineering

    The journal Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and communication and information systems. The journal publishes papers featuring novel implementations of …. View full aims & scope.

  4. Home

    Journal of Computer Science and Technology is an international platform publishing high quality, refereed papers in all aspects of computer science and technology. Sponsored by the Institute of Computing Technology (ICT), Chinese Academy of Sciences (CAS), and China Computer Federation (CCF). Jointly published by ICT, CAS and Springer on a ...

  5. Computer science

    Computer science is the study and development of the protocols required for automated processing and manipulation of data. This includes, for example, creating algorithms for efficiently searching ...

  6. Journal of Electrical and Computer Engineering

    05 Apr 2024. 30 Mar 2024. 20 Mar 2024. 18 Mar 2024. Journal of Electrical and Computer Engineering publishes recent advances from the rapidly moving fields of both electrical engineering and computer engineering in the areas of circuits and systems, communications, power systems and signal processing.

  7. Review of Computer Engineering Studies

    Review of Computer Engineering Studies (RCES) is an international, scholarly and peer-reviewed journal dedicated to providing scientists, engineers and technicians with the latest developments on computer science.The journal offers a window into the most recent discoveries in four categories, namely, computing (computing theory, scientific computing, cloud computing, high-performance computing ...

  8. Home

    Engineering with Computers accumulated a long list of online first articles over the years. To accommodate these backlogs, six regular issues and five supplementary issues were published in Volume 38 during 2022, with about 50 articles in each issue. These supplementary issues, therefore, represent a continuation of the regular issues.

  9. computer science Latest Research Papers

    Computer science ( CS ) majors are in high demand and account for a large part of national computer and information technology job market applicants. Employment in this sector is projected to grow 12% between 2018 and 2028, which is faster than the average of all other occupations. Published data are available on traditional non-computer ...

  10. Computer Science and Engineering Theses and Dissertations

    Human-centered Cybersecurity Research — Anthropological Findings from Two Longitudinal Studies, Anwesh Tuladhar. PDF. Learning State-Dependent Sensor Measurement Models To Improve Robot Localization Accuracy, Troi André Williams. PDF. Human-centric Cybersecurity Research: From Trapping the Bad Guys to Helping the Good Ones, Armin Ziaie Tabari

  11. Computer Engineering

    All Articles in Computer Engineering. 23,565 full-text articles. Page 1 of 929. Analyzing The Impact Of Socioeconomic Factors On Cancer Clinical Trials Accessibility In The U.S. Using Machine Learning , Krysta L. Ray, Hiromi Honda 2024 Arkansas Tech University. Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization ...

  12. Journal of Engineering Research

    Journal of Engineering Research (JER) is an international, peer reviewed journal which publishes full length original research papers, reviews and case studies related to all areas of Engineering such as: Civil, Mechanical, Industrial, Electrical, Computer, Chemical, Petroleum, Aerospace, Architectural, etc. JER is intended to serve a wide range of educationists, scientists, specialists ...

  13. Top Ten Computer Science Education Research Papers of the Last 50 Years

    We also believe that highlighting excellent research will inspire others to enter the computing education field and make their own contributions.". The Top Ten Symposium Papers are: 1. " Identifying student misconceptions of programming " (2010) Lisa C. Kaczmarczyk, Elizabeth R. Petrick, University of California, San Diego; Philip East ...

  14. Find Articles & Papers

    Electrical and Computer Engineering Research Resources: Find Articles & Papers. ... Contains full-text papers on optics and photonics from SPIE journals and proceedings published since 1990. Approximately 15,000 new papers will be added each year. Subject Guide. Grainger Engineering Library

  15. Best Papers of 2020: Systems Engineering

    Best Papers of 2020. Each year, the International Council on Systems Engineering (INCOSE) selects a Best Paper award from among the papers published the previous year in Systems Engineering. The Editorial Board considers the papers in this virtual issue to be among the best from those published in 2020. We hope this virtual issue will provide ...

  16. Computers & Industrial Engineering

    Industrial engineering is one of the earliest fields to utilize computers in research, education, and practice. Over the years, computers and electronic communication have become an integral part of industrial engineering.Computers & Industrial Engineering (CAIE) is aimed at an audience of …. View full aims & scope $3440

  17. International Journal of Computer Engineering in Research Trends

    View All Issues. International Journal of Computer Engineering in Research Trends (IJCERT) is a peer-reviewed, open access journal that publishes high-quality research papers, reviews, short communications, and notes in the field of computer science engineering and its research trends. The journal covers a wide range of topics in computer ...

  18. Research

    A unique and robust research environment. At Michigan, faculty and students in CSE have the unique opportunity to collaborate with peers from across 19 highly-acclaimed schools and colleges to conduct impactful, broad ranging, and highly interdisciplinary research. Resources at the University include leading schools of medicine, business ...

  19. Research Guides: Computer Engineering: Articles & Journals

    Selected full text articles for English-language journals, reports, conference papers, etc., in engineering, acoustics, chemistry, computers, metallurgy, physics, plastics, telecommunications, transportation, waste management, and more. Web of Science. Identifies articles and references from journals in science, the social sciences, and art and ...

  20. Computing Engineering Dissertation Topics

    2022 Computing Engineering Dissertation Topics. Topic 1: An investigation of the blockchain's application on the energy sector leading towards electricity production and e-mobility. Research Aim: This study aims to investigate the applications of blockchain within the energy sector.

  21. Pioneering Research on Wirelessly Powered Backscatter Communications

    The research paper "Advances in Wirelessly Powered Backscatter Communications: From Antenna/RF Circuitry Design to Printed Flexible Electronics" has received the distinguished 2023 Best Paper Award from a leading technical journal, underscoring its significant contributions to the field.The article was published in "Proceedings of the IEEE," vol. 110, no. 1, pp. 171-192 in January 2022.

  22. Computer Engineering Books and Book Reviews

    Computer Engineering Research Papers/Topics . Case-based reasoning system for prediction of fuel consumption by haulage trucks in open-pit mines. Abstract: The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose ...

  23. [2404.18021] CRISPR-GPT: An LLM Agent for Automated Design of Gene

    The introduction of genome engineering technology has transformed biomedical research, making it possible to make precise changes to genetic information. However, creating an efficient gene-editing system requires a deep understanding of CRISPR technology, and the complex experimental systems under investigation. While Large Language Models (LLMs) have shown promise in various tasks, they ...

  24. Sherman et al. win best paper for cybersecurity education

    Cybersecurity Curriculum Assessment for student knowledge CSEE Professor Alan Sherman and his colleagues received the Best Paper award in the Computing Education Research Track at the 2023 ACM SIGCSE Technical Symposium. The symposium is the main ACM conference for computer science educators and has been held annually since 1970. The paper, Psychometric Evaluation of the Cybersecurity ...