AIP Publishing Logo

Research methodology for computer science

Electronic mail: [email protected]

Electronic mail: [email protected]

  • Article contents
  • Figures & tables
  • Supplementary Data
  • Peer Review
  • Reprints and Permissions
  • Cite Icon Cite
  • Search Site

Mahyuddin K. M. Nasution , Marischa Elveny , Rahmad Syah; Research methodology for computer science. AIP Conf. Proc. 9 May 2023; 2714 (1): 020030. https://doi.org/10.1063/5.0134511

Download citation file:

  • Ris (Zotero)
  • Reference Manager

This paper aims to provide an understanding of the basis for conducting a research with output in the form of scientific publications. A study, from proposal to scientific works, requires a research methodology. Many studies have been carried out on methodology, but few have returned according to the demands of the digitalization era. A methodology is in a fundamental position, also in computer science. The methodology familiarizes phenomena and paradigms with which objectives as interpretations of the problem formulation can be delivered to the target or outcome. That are, from concept until theory, the implication only, or as application of computer science.

Citing articles via

Publish with us - request a quote.

computer science research methodology example

Sign up for alerts

  • Online ISSN 1551-7616
  • Print ISSN 0094-243X
  • For Researchers
  • For Librarians
  • For Advertisers
  • Our Publishing Partners  
  • Physics Today
  • Conference Proceedings
  • Special Topics

pubs.aip.org

  • Privacy Policy
  • Terms of Use

Connect with AIP Publishing

This feature is available to subscribers only.

Sign In or Create an Account

computer science research methodology example

Research Techniques for Computer Science, Information Systems and Cybersecurity

  • © 2023
  • Uche M. Mbanaso 0 ,
  • Lucienne Abrahams 1 ,
  • Kennedy Chinedu Okafor 2

Centre for Cybersecurity Studies, Nasarawa State University, Keffi, Nigeria

You can also search for this author in PubMed   Google Scholar

LINK Centre, University of the Witwatersrand, Johannesburg, South Africa

Department of mechatronics engineering, federal university of technology, owerri, nigeria.

  • Provides a roadmap for CS, information systems and cybersecurity grappling with framing research topics
  • Presents path for embarking on research projects by reducing complexities to understanding the topics’ relevant needs
  • Distinguishes CS information systems and cybersecurity research while highlighting their intersection in a practical way

6762 Accesses

2 Citations

4 Altmetric

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Similar content being viewed by others.

computer science research methodology example

Introduction

computer science research methodology example

Retrospect and prospect: information systems research in the last and next 25 years

computer science research methodology example

Data Mining Methodology in Support of a Systematic Review of Human Aspects of Cybersecurity

  • Cybersecurity
  • information systems
  • contemporary research
  • mind mapping
  • funnel strategy
  • quantitative research
  • qualitative research

Table of contents (8 chapters)

Front matter, twenty-first century postgraduate research.

  • Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor

Computer Science (CS), Information Systems (IS) and Cybersecurity (CY) Research

Designing the research proposal or interim report, adopting a funnel strategy and using mind mapping to visualize the research design, foundational research writing, background discussion and literature review for cs, is and cy, research philosophy, design and methodology, data collection, presentation and analysis, research management: starting, completing and submitting the final research report, dissertation or thesis, back matter, authors and affiliations.

Uche M. Mbanaso

Lucienne Abrahams

Kennedy Chinedu Okafor

About the authors

Uche M. Mbanaso (PhD) is a leading Cybersecurity subject matter expert (SME), and currently the Executive Director, Centre for Cyberspace Studies, an Associate Professor, Cybersecurity and Computing at Nasarawa State University, Keffi, Nigeria, a visiting academic at the LINK Centre, Wits University of Witwatersrand, Johannesburg, South Africa. He lectures computing and cybersecurity and has extensive experience in conducting research, having secured several grants for research studies. He remains a key player in the development of Cybersecurity, having played important roles in the development of Cybersecurity Policy and Strategy, Data and Privacy Protection, and many other Cybersecurity initiatives in Africa.

Luci Abrahams (PhD) is Director of the LINK Centre at Wits University, building research on digital innovation and how digital technologies and processes influence change. Studies include case studies in digital governance; digital skills gap analysis; digital strategy; scaling up innovation in tech hubs; open access in scholarly publishing (Open AIR research partnership); and health e-services improvement (Egypt-South Africa research partnership). Luci convenes the MA and PhD programmes in Interdisciplinary Digital Knowledge Economy Studies and supervises postgraduate research; lectures on short courses in disruptive technologies, digital operations, and leadership; and lectures on research methods for cybersecurity professional practice.

Kennedy Chinedu Okafor is a Senior Member, IEEE, USA; Chair of IEEE Consultants Network AG-Nigeria, and a Senior teaching researcher with the Department of Mechatronics Engineering, Federal University of Technology, Owerri-Nigeria. Kennedy is a World bank Faculty at the AFRICA Center of Excellence for Sustainable Power and Energy Development (ACESPED), University of Nigeria Nsukka (UNN), Nigeria. In 2017, Kennedy received the prestigious Vice-Chancellor Award as the overall best graduating Ph. D candidate from the Faculty of Engineering, UNN. He is a Senior research associate with the University of Johannesburg and a visiting Fellow at Imperial College London. Kennedy is an expert in Smart Cyberphysical systems, and Network Security within Mechatronics sub-specialty.

Bibliographic Information

Book Title : Research Techniques for Computer Science, Information Systems and Cybersecurity

Authors : Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor

DOI : https://doi.org/10.1007/978-3-031-30031-8

Publisher : Springer Cham

eBook Packages : Engineering , Engineering (R0)

Copyright Information : The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023

Hardcover ISBN : 978-3-031-30030-1 Published: 25 May 2023

Softcover ISBN : 978-3-031-30033-2 Published: 26 May 2024

eBook ISBN : 978-3-031-30031-8 Published: 24 May 2023

Edition Number : 1

Number of Pages : XXXV, 161

Number of Illustrations : 23 b/w illustrations, 22 illustrations in colour

Topics : Engineering Design , Operations Research/Decision Theory , Research Skills , Business and Management, general

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Department of Computer Science

Cs908 research methods, cs908-15 research methods.

Download as PDF

  • Description
  • Availability

Introductory description

The module aims to facilitate students' acquisition of a range of research methods, ensure that students are aware of the legal framework within which research is conducted, and that students are sensitive to the social and ethical issues which affect Computer Science research.

Module aims

The module will assist students in the various stages involved in undertaking a substantial research project, covering: researching and choosing a topic, finding a supervisor, writing a research proposal, narrowing the scope of the project, planning, researching, writing and finally submitting their dissertation. The module's overall aim is to offer an intellectually challenging and supportive environment which allows students to develop their research and communication skills in the context of undertaking a research project of their choice.

Outline syllabus

This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.

  • Introduction to research methods
  • Use of secondary sources
  • Round-table research discussion
  • Academic writing
  • Writing research proposals

Learning outcomes

By the end of the module, students should be able to:

  • Understand the research methods used in Computer Science (CS); distinguish between different types of academic writing strategies; write an effective and feasible research proposal; use electronic systems of bibliographic citation.
  • Demonstrate improved written and verbal communication skills; use selected CS databases; use systems for bibliography construction; conduct peer reviewing in a professional manner; understand time-management and project management skills; avoid plagiarism of secondary sources by using a variety of writing strategies.
  • Critique scholarly articles in their research area; conduct a comparative critical analysis of scholarship in their field; formulate a scientifically sound hypothesis and offer support for it through empirical evidence; communicate the results of their peer review; engage with research methods intelligently and with confidence; write a long research paper which sustains an original and sound argument.
  • Conduct research in CS in an effective and productive manner; write a scientific paper; write a research proposal; conduct a critical review of a scholarly article; conduct peer review; manage a long research project and see it to completion; use secondary sources in their writing in an accurate and honest manner.

Indicative reading list

Please see Talis Aspire link for most up to date list.

View reading list on Talis Aspire

Research element

independent research

Subject specific skills

  • understand the research methods used in Computer Science (CS)
  • distinguish between different types of academic writing strategies
  • write an effective and feasible research proposal
  • understand the principal legal issues which affect computer science research, and be aware of the need to recognise the ethical and social impact of their research activities
  • use electronic systems of bibliographic citation
  • conduct research in CS in an effective and productive manner
  • write a scientific paper write a research proposal
  • conduct a critical review of a scholarly article
  • manage a long research project and see it to completion

Transferable skills

  • demonstrate improved written and verbal communication skills
  • use selected CS databases
  • use systems for bibliography construction
  • understand time-management and project management skills
  • avoid plagiarism of secondary sources by using a variety of writing strategies.
Type Required
Lectures 10 sessions of 2 hours (13%)
Private study 130 hours (87%)
Total 150 hours

Private study description

Self-directed study, focused around the assessments.

No further costs have been identified for this module.

You do not need to pass all assessment components to pass the module.

Students can register for this module without taking any assessment.

Assessment group A2

Weighting Study time
Assignment : Critical Analysis 40%

Assignment : Critical Analysis. This assignment is worth more than 3 CATS and is not, therefore, eligible for self-certification.

Presentation 20%

presentation

Assignment : Dissertation Specification - Research Proposal 40%

Assignment: Dissertation Specification - Research Proposal. This assignment is worth more than 3 CATS and is not, therefore, eligible for self-certification.

Assessment group R1

Weighting Study time
Written report - Resit Assignment 100%

Feedback on assessment

Written and oral feedback on each component of assessment.

This module is Core for:

  • Year 1 of G5PD Computer Science
  • Year 1 of TCSA-G5PA Postgraduate Taught Data Analytics

Further Information

Online Material

This week: the arXiv Accessibility Forum

Help | Advanced Search

Computer Science > General Literature

Title: research methods in computer science: the challenges and issues.

Abstract: Research methods are essential parts in conducting any research project. Although they have been theorized and summarized based on best practices, every field of science requires an adaptation of the overall approaches to perform research activities. In addition, any specific research needs a particular adjustment to the generalized approach and specializing them to suit the project in hand. However, unlike most well-established science disciplines, computing research is not supported by well-defined, globally accepted methods. This is because of its infancy and ambiguity in its definition, on one hand, and its extensive coverage and overlap with other fields, on the other hand. This article discusses the research methods in science and engineering in general and in computing in particular. It shows that despite several special parameters that make research in computing rather unique, it still follows the same steps that any other scientific research would do. The article also shows the particularities that researchers need to consider when they conduct research in this field.
Subjects: General Literature (cs.GL)
Cite as: [cs.GL]
  (or [cs.GL] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Computer Science Research Methodologies

Profile image of Chikezie K Nwagu

This paper discusses the several research methodologies that can be used in Computer Science (CS) and Information Systems (IS). The research methods vary according to the science domain and project field. However a little of research methodologies can be reasonable for Computer Science and Information System.

Related Papers

Toni Setzer

This is a collection of notes I have accumulated regarding research method-ologies, especially for the use of my project students. It is a document mainly directed for my students, and not an official document by the department of computer science. 1 Definition of Research Methodology Definition (private communication by Markus Roggenbach) The methodology is the general strategy that outlines the way in which the project is to be undertaken and, among other things, identifies the methods to be used in it. 2 List of Research Methodologies • A good book (directed at Humanities) is [vPHZ12]. • [Ama15] lists as research methodologies the following: formal, experimen-tal, build, process. • [Wik15d] list under “See also ” the following methodologies:

computer science research methodology example

Hossein Hassani

Research methods are essential parts in conducting any research project. Although they have been theorized and summarized based on best practices, every field of science requires an adaptation of the overall approaches to perform research activities. In addition, any specific research needs a particular adjustment to the generalized approach and specializing them to suit the project in hand. However, unlike most well-established science disciplines, computing research is not supported by well-defined, globally accepted methods. This is because of its infancy and ambiguity in its definition, on one hand, and its extensive coverage and overlap with other fields, on the other hand. This article discusses the research methods in science and engineering in general and in computing in particular. It shows that despite several special parameters that make research in computing rather unique, it still follows the same steps that any other scientific research would do. The article also shows...

Mutebi Edrine

Fatima Shaikh

In the area of scientific researches, research methods are important parameters to describe research properly. In the approach towards research methods, Qualitative research is dominantly been used to study collection of a variety of empirical materials. In the approach towards modern scientific researches based on research methods, the detail research methods have been designed to deepen the student‘s appreciation of what computer research is and how it is carried out. Much of the ingenuity in research involves selecting and tailoring the method to the question at hand. However in these research methods, students should be able to identify seminal and cutting-edge topics in computer science, distinguish research topics from engineering tasks, and know how to go about evaluating the novelty and contribution of a research idea. They should know how to write a critical survey. To achieve this objective in this paper, a qualitative research approach is proposed to achieve a good knowle...

Information Systems Development

Seppo Puuronen

ACM SIGCSE Bulletin

Bruria Haberman

Kenneth Ohei

The dissertation provides a consideration of the significance of choosing an appropriate post-graduate research methodology and application in higher education institutions. Research education has become a matter of concern as there are low completion rates of masters' students in South African universities. This study addresses the issue with the application of appropriate IS research methodologies of IT/IS masters' and MBA dissertations/theses at the NWU to determine whether the research approaches used in both disciplines were relevant to their studies. The choice of an appropriate research methodology is an arduous task with which many researchers are confronted during the research process. The problem is that IT/IS masters' and MBA students use particular research methodologies inappropriately but consider these to be the most appropriate methodologies for IS research for purposes of writing their dissertations. The primary research objective was to explore IT/IS an...

Communications of the ACM

Robert Galliers

Information & Management

kybele.escet.urjc.es

Sergio Guzman

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

South African Computer …

Ian Sanders

IFAC-PapersOnLine

Virginie GOEPP

Jam Villanueva

Concepts, Methodologies, Tools, and Applications

Jorge Morato

Artificial Intelligence for Engineering, Design, Analysis and Manufacturing

Yoram Reich

Research Methodology and Research Method

Sam Goundar

Edgar Sibley

Karin Hedström

Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management

Colin Pilkington

Kirsti E Berntsen

Roxannie Ibot

Miyoko Chin

Juhani Iivari

International Journal of Computing and Digital Systems

Soobia Saeed

rafael diaz gonzalez

Lowella Viray

ACM SIGMIS Database

Benn Konsynski

Daniel Mejia

Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering - ASE '07

Ngoc Nguyen

… Intelligence for Engineering, Design, Analysis and …

Khamis S Moh'd

Raija Halonen

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • Privacy Policy

Research Method

Home » 500+ Computer Science Research Topics

500+ Computer Science Research Topics

Computer Science Research Topics

Computer Science is a constantly evolving field that has transformed the world we live in today. With new technologies emerging every day, there are countless research opportunities in this field. Whether you are interested in artificial intelligence, machine learning, cybersecurity, data analytics, or computer networks, there are endless possibilities to explore. In this post, we will delve into some of the most interesting and important research topics in Computer Science. From the latest advancements in programming languages to the development of cutting-edge algorithms, we will explore the latest trends and innovations that are shaping the future of Computer Science. So, whether you are a student or a professional, read on to discover some of the most exciting research topics in this dynamic and rapidly expanding field.

Computer Science Research Topics

Computer Science Research Topics are as follows:

  • Using machine learning to detect and prevent cyber attacks
  • Developing algorithms for optimized resource allocation in cloud computing
  • Investigating the use of blockchain technology for secure and decentralized data storage
  • Developing intelligent chatbots for customer service
  • Investigating the effectiveness of deep learning for natural language processing
  • Developing algorithms for detecting and removing fake news from social media
  • Investigating the impact of social media on mental health
  • Developing algorithms for efficient image and video compression
  • Investigating the use of big data analytics for predictive maintenance in manufacturing
  • Developing algorithms for identifying and mitigating bias in machine learning models
  • Investigating the ethical implications of autonomous vehicles
  • Developing algorithms for detecting and preventing cyberbullying
  • Investigating the use of machine learning for personalized medicine
  • Developing algorithms for efficient and accurate speech recognition
  • Investigating the impact of social media on political polarization
  • Developing algorithms for sentiment analysis in social media data
  • Investigating the use of virtual reality in education
  • Developing algorithms for efficient data encryption and decryption
  • Investigating the impact of technology on workplace productivity
  • Developing algorithms for detecting and mitigating deepfakes
  • Investigating the use of artificial intelligence in financial trading
  • Developing algorithms for efficient database management
  • Investigating the effectiveness of online learning platforms
  • Developing algorithms for efficient and accurate facial recognition
  • Investigating the use of machine learning for predicting weather patterns
  • Developing algorithms for efficient and secure data transfer
  • Investigating the impact of technology on social skills and communication
  • Developing algorithms for efficient and accurate object recognition
  • Investigating the use of machine learning for fraud detection in finance
  • Developing algorithms for efficient and secure authentication systems
  • Investigating the impact of technology on privacy and surveillance
  • Developing algorithms for efficient and accurate handwriting recognition
  • Investigating the use of machine learning for predicting stock prices
  • Developing algorithms for efficient and secure biometric identification
  • Investigating the impact of technology on mental health and well-being
  • Developing algorithms for efficient and accurate language translation
  • Investigating the use of machine learning for personalized advertising
  • Developing algorithms for efficient and secure payment systems
  • Investigating the impact of technology on the job market and automation
  • Developing algorithms for efficient and accurate object tracking
  • Investigating the use of machine learning for predicting disease outbreaks
  • Developing algorithms for efficient and secure access control
  • Investigating the impact of technology on human behavior and decision making
  • Developing algorithms for efficient and accurate sound recognition
  • Investigating the use of machine learning for predicting customer behavior
  • Developing algorithms for efficient and secure data backup and recovery
  • Investigating the impact of technology on education and learning outcomes
  • Developing algorithms for efficient and accurate emotion recognition
  • Investigating the use of machine learning for improving healthcare outcomes
  • Developing algorithms for efficient and secure supply chain management
  • Investigating the impact of technology on cultural and societal norms
  • Developing algorithms for efficient and accurate gesture recognition
  • Investigating the use of machine learning for predicting consumer demand
  • Developing algorithms for efficient and secure cloud storage
  • Investigating the impact of technology on environmental sustainability
  • Developing algorithms for efficient and accurate voice recognition
  • Investigating the use of machine learning for improving transportation systems
  • Developing algorithms for efficient and secure mobile device management
  • Investigating the impact of technology on social inequality and access to resources
  • Machine learning for healthcare diagnosis and treatment
  • Machine Learning for Cybersecurity
  • Machine learning for personalized medicine
  • Cybersecurity threats and defense strategies
  • Big data analytics for business intelligence
  • Blockchain technology and its applications
  • Human-computer interaction in virtual reality environments
  • Artificial intelligence for autonomous vehicles
  • Natural language processing for chatbots
  • Cloud computing and its impact on the IT industry
  • Internet of Things (IoT) and smart homes
  • Robotics and automation in manufacturing
  • Augmented reality and its potential in education
  • Data mining techniques for customer relationship management
  • Computer vision for object recognition and tracking
  • Quantum computing and its applications in cryptography
  • Social media analytics and sentiment analysis
  • Recommender systems for personalized content delivery
  • Mobile computing and its impact on society
  • Bioinformatics and genomic data analysis
  • Deep learning for image and speech recognition
  • Digital signal processing and audio processing algorithms
  • Cloud storage and data security in the cloud
  • Wearable technology and its impact on healthcare
  • Computational linguistics for natural language understanding
  • Cognitive computing for decision support systems
  • Cyber-physical systems and their applications
  • Edge computing and its impact on IoT
  • Machine learning for fraud detection
  • Cryptography and its role in secure communication
  • Cybersecurity risks in the era of the Internet of Things
  • Natural language generation for automated report writing
  • 3D printing and its impact on manufacturing
  • Virtual assistants and their applications in daily life
  • Cloud-based gaming and its impact on the gaming industry
  • Computer networks and their security issues
  • Cyber forensics and its role in criminal investigations
  • Machine learning for predictive maintenance in industrial settings
  • Augmented reality for cultural heritage preservation
  • Human-robot interaction and its applications
  • Data visualization and its impact on decision-making
  • Cybersecurity in financial systems and blockchain
  • Computer graphics and animation techniques
  • Biometrics and its role in secure authentication
  • Cloud-based e-learning platforms and their impact on education
  • Natural language processing for machine translation
  • Machine learning for predictive maintenance in healthcare
  • Cybersecurity and privacy issues in social media
  • Computer vision for medical image analysis
  • Natural language generation for content creation
  • Cybersecurity challenges in cloud computing
  • Human-robot collaboration in manufacturing
  • Data mining for predicting customer churn
  • Artificial intelligence for autonomous drones
  • Cybersecurity risks in the healthcare industry
  • Machine learning for speech synthesis
  • Edge computing for low-latency applications
  • Virtual reality for mental health therapy
  • Quantum computing and its applications in finance
  • Biomedical engineering and its applications
  • Cybersecurity in autonomous systems
  • Machine learning for predictive maintenance in transportation
  • Computer vision for object detection in autonomous driving
  • Augmented reality for industrial training and simulations
  • Cloud-based cybersecurity solutions for small businesses
  • Natural language processing for knowledge management
  • Machine learning for personalized advertising
  • Cybersecurity in the supply chain management
  • Cybersecurity risks in the energy sector
  • Computer vision for facial recognition
  • Natural language processing for social media analysis
  • Machine learning for sentiment analysis in customer reviews
  • Explainable Artificial Intelligence
  • Quantum Computing
  • Blockchain Technology
  • Human-Computer Interaction
  • Natural Language Processing
  • Cloud Computing
  • Robotics and Automation
  • Augmented Reality and Virtual Reality
  • Cyber-Physical Systems
  • Computational Neuroscience
  • Big Data Analytics
  • Computer Vision
  • Cryptography and Network Security
  • Internet of Things
  • Computer Graphics and Visualization
  • Artificial Intelligence for Game Design
  • Computational Biology
  • Social Network Analysis
  • Bioinformatics
  • Distributed Systems and Middleware
  • Information Retrieval and Data Mining
  • Computer Networks
  • Mobile Computing and Wireless Networks
  • Software Engineering
  • Database Systems
  • Parallel and Distributed Computing
  • Human-Robot Interaction
  • Intelligent Transportation Systems
  • High-Performance Computing
  • Cyber-Physical Security
  • Deep Learning
  • Sensor Networks
  • Multi-Agent Systems
  • Human-Centered Computing
  • Wearable Computing
  • Knowledge Representation and Reasoning
  • Adaptive Systems
  • Brain-Computer Interface
  • Health Informatics
  • Cognitive Computing
  • Cybersecurity and Privacy
  • Internet Security
  • Cybercrime and Digital Forensics
  • Cloud Security
  • Cryptocurrencies and Digital Payments
  • Machine Learning for Natural Language Generation
  • Cognitive Robotics
  • Neural Networks
  • Semantic Web
  • Image Processing
  • Cyber Threat Intelligence
  • Secure Mobile Computing
  • Cybersecurity Education and Training
  • Privacy Preserving Techniques
  • Cyber-Physical Systems Security
  • Virtualization and Containerization
  • Machine Learning for Computer Vision
  • Network Function Virtualization
  • Cybersecurity Risk Management
  • Information Security Governance
  • Intrusion Detection and Prevention
  • Biometric Authentication
  • Machine Learning for Predictive Maintenance
  • Security in Cloud-based Environments
  • Cybersecurity for Industrial Control Systems
  • Smart Grid Security
  • Software Defined Networking
  • Quantum Cryptography
  • Security in the Internet of Things
  • Natural language processing for sentiment analysis
  • Blockchain technology for secure data sharing
  • Developing efficient algorithms for big data analysis
  • Cybersecurity for internet of things (IoT) devices
  • Human-robot interaction for industrial automation
  • Image recognition for autonomous vehicles
  • Social media analytics for marketing strategy
  • Quantum computing for solving complex problems
  • Biometric authentication for secure access control
  • Augmented reality for education and training
  • Intelligent transportation systems for traffic management
  • Predictive modeling for financial markets
  • Cloud computing for scalable data storage and processing
  • Virtual reality for therapy and mental health treatment
  • Data visualization for business intelligence
  • Recommender systems for personalized product recommendations
  • Speech recognition for voice-controlled devices
  • Mobile computing for real-time location-based services
  • Neural networks for predicting user behavior
  • Genetic algorithms for optimization problems
  • Distributed computing for parallel processing
  • Internet of things (IoT) for smart cities
  • Wireless sensor networks for environmental monitoring
  • Cloud-based gaming for high-performance gaming
  • Social network analysis for identifying influencers
  • Autonomous systems for agriculture
  • Robotics for disaster response
  • Data mining for customer segmentation
  • Computer graphics for visual effects in movies and video games
  • Virtual assistants for personalized customer service
  • Natural language understanding for chatbots
  • 3D printing for manufacturing prototypes
  • Artificial intelligence for stock trading
  • Machine learning for weather forecasting
  • Biomedical engineering for prosthetics and implants
  • Cybersecurity for financial institutions
  • Machine learning for energy consumption optimization
  • Computer vision for object tracking
  • Natural language processing for document summarization
  • Wearable technology for health and fitness monitoring
  • Internet of things (IoT) for home automation
  • Reinforcement learning for robotics control
  • Big data analytics for customer insights
  • Machine learning for supply chain optimization
  • Natural language processing for legal document analysis
  • Artificial intelligence for drug discovery
  • Computer vision for object recognition in robotics
  • Data mining for customer churn prediction
  • Autonomous systems for space exploration
  • Robotics for agriculture automation
  • Machine learning for predicting earthquakes
  • Natural language processing for sentiment analysis in customer reviews
  • Big data analytics for predicting natural disasters
  • Internet of things (IoT) for remote patient monitoring
  • Blockchain technology for digital identity management
  • Machine learning for predicting wildfire spread
  • Computer vision for gesture recognition
  • Natural language processing for automated translation
  • Big data analytics for fraud detection in banking
  • Internet of things (IoT) for smart homes
  • Robotics for warehouse automation
  • Machine learning for predicting air pollution
  • Natural language processing for medical record analysis
  • Augmented reality for architectural design
  • Big data analytics for predicting traffic congestion
  • Machine learning for predicting customer lifetime value
  • Developing algorithms for efficient and accurate text recognition
  • Natural Language Processing for Virtual Assistants
  • Natural Language Processing for Sentiment Analysis in Social Media
  • Explainable Artificial Intelligence (XAI) for Trust and Transparency
  • Deep Learning for Image and Video Retrieval
  • Edge Computing for Internet of Things (IoT) Applications
  • Data Science for Social Media Analytics
  • Cybersecurity for Critical Infrastructure Protection
  • Natural Language Processing for Text Classification
  • Quantum Computing for Optimization Problems
  • Machine Learning for Personalized Health Monitoring
  • Computer Vision for Autonomous Driving
  • Blockchain Technology for Supply Chain Management
  • Augmented Reality for Education and Training
  • Natural Language Processing for Sentiment Analysis
  • Machine Learning for Personalized Marketing
  • Big Data Analytics for Financial Fraud Detection
  • Cybersecurity for Cloud Security Assessment
  • Artificial Intelligence for Natural Language Understanding
  • Blockchain Technology for Decentralized Applications
  • Virtual Reality for Cultural Heritage Preservation
  • Natural Language Processing for Named Entity Recognition
  • Machine Learning for Customer Churn Prediction
  • Big Data Analytics for Social Network Analysis
  • Cybersecurity for Intrusion Detection and Prevention
  • Artificial Intelligence for Robotics and Automation
  • Blockchain Technology for Digital Identity Management
  • Virtual Reality for Rehabilitation and Therapy
  • Natural Language Processing for Text Summarization
  • Machine Learning for Credit Risk Assessment
  • Big Data Analytics for Fraud Detection in Healthcare
  • Cybersecurity for Internet Privacy Protection
  • Artificial Intelligence for Game Design and Development
  • Blockchain Technology for Decentralized Social Networks
  • Virtual Reality for Marketing and Advertising
  • Natural Language Processing for Opinion Mining
  • Machine Learning for Anomaly Detection
  • Big Data Analytics for Predictive Maintenance in Transportation
  • Cybersecurity for Network Security Management
  • Artificial Intelligence for Personalized News and Content Delivery
  • Blockchain Technology for Cryptocurrency Mining
  • Virtual Reality for Architectural Design and Visualization
  • Natural Language Processing for Machine Translation
  • Machine Learning for Automated Image Captioning
  • Big Data Analytics for Stock Market Prediction
  • Cybersecurity for Biometric Authentication Systems
  • Artificial Intelligence for Human-Robot Interaction
  • Blockchain Technology for Smart Grids
  • Virtual Reality for Sports Training and Simulation
  • Natural Language Processing for Question Answering Systems
  • Machine Learning for Sentiment Analysis in Customer Feedback
  • Big Data Analytics for Predictive Maintenance in Manufacturing
  • Cybersecurity for Cloud-Based Systems
  • Artificial Intelligence for Automated Journalism
  • Blockchain Technology for Intellectual Property Management
  • Virtual Reality for Therapy and Rehabilitation
  • Natural Language Processing for Language Generation
  • Machine Learning for Customer Lifetime Value Prediction
  • Big Data Analytics for Predictive Maintenance in Energy Systems
  • Cybersecurity for Secure Mobile Communication
  • Artificial Intelligence for Emotion Recognition
  • Blockchain Technology for Digital Asset Trading
  • Virtual Reality for Automotive Design and Visualization
  • Natural Language Processing for Semantic Web
  • Machine Learning for Fraud Detection in Financial Transactions
  • Big Data Analytics for Social Media Monitoring
  • Cybersecurity for Cloud Storage and Sharing
  • Artificial Intelligence for Personalized Education
  • Blockchain Technology for Secure Online Voting Systems
  • Virtual Reality for Cultural Tourism
  • Natural Language Processing for Chatbot Communication
  • Machine Learning for Medical Diagnosis and Treatment
  • Big Data Analytics for Environmental Monitoring and Management.
  • Cybersecurity for Cloud Computing Environments
  • Virtual Reality for Training and Simulation
  • Big Data Analytics for Sports Performance Analysis
  • Cybersecurity for Internet of Things (IoT) Devices
  • Artificial Intelligence for Traffic Management and Control
  • Blockchain Technology for Smart Contracts
  • Natural Language Processing for Document Summarization
  • Machine Learning for Image and Video Recognition
  • Blockchain Technology for Digital Asset Management
  • Virtual Reality for Entertainment and Gaming
  • Natural Language Processing for Opinion Mining in Online Reviews
  • Machine Learning for Customer Relationship Management
  • Big Data Analytics for Environmental Monitoring and Management
  • Cybersecurity for Network Traffic Analysis and Monitoring
  • Artificial Intelligence for Natural Language Generation
  • Blockchain Technology for Supply Chain Transparency and Traceability
  • Virtual Reality for Design and Visualization
  • Natural Language Processing for Speech Recognition
  • Machine Learning for Recommendation Systems
  • Big Data Analytics for Customer Segmentation and Targeting
  • Cybersecurity for Biometric Authentication
  • Artificial Intelligence for Human-Computer Interaction
  • Blockchain Technology for Decentralized Finance (DeFi)
  • Virtual Reality for Tourism and Cultural Heritage
  • Machine Learning for Cybersecurity Threat Detection and Prevention
  • Big Data Analytics for Healthcare Cost Reduction
  • Cybersecurity for Data Privacy and Protection
  • Artificial Intelligence for Autonomous Vehicles
  • Blockchain Technology for Cryptocurrency and Blockchain Security
  • Virtual Reality for Real Estate Visualization
  • Natural Language Processing for Question Answering
  • Big Data Analytics for Financial Markets Prediction
  • Cybersecurity for Cloud-Based Machine Learning Systems
  • Artificial Intelligence for Personalized Advertising
  • Blockchain Technology for Digital Identity Verification
  • Virtual Reality for Cultural and Language Learning
  • Natural Language Processing for Semantic Analysis
  • Machine Learning for Business Forecasting
  • Big Data Analytics for Social Media Marketing
  • Artificial Intelligence for Content Generation
  • Blockchain Technology for Smart Cities
  • Virtual Reality for Historical Reconstruction
  • Natural Language Processing for Knowledge Graph Construction
  • Machine Learning for Speech Synthesis
  • Big Data Analytics for Traffic Optimization
  • Artificial Intelligence for Social Robotics
  • Blockchain Technology for Healthcare Data Management
  • Virtual Reality for Disaster Preparedness and Response
  • Natural Language Processing for Multilingual Communication
  • Machine Learning for Emotion Recognition
  • Big Data Analytics for Human Resources Management
  • Cybersecurity for Mobile App Security
  • Artificial Intelligence for Financial Planning and Investment
  • Blockchain Technology for Energy Management
  • Virtual Reality for Cultural Preservation and Heritage.
  • Big Data Analytics for Healthcare Management
  • Cybersecurity in the Internet of Things (IoT)
  • Artificial Intelligence for Predictive Maintenance
  • Computational Biology for Drug Discovery
  • Virtual Reality for Mental Health Treatment
  • Machine Learning for Sentiment Analysis in Social Media
  • Human-Computer Interaction for User Experience Design
  • Cloud Computing for Disaster Recovery
  • Quantum Computing for Cryptography
  • Intelligent Transportation Systems for Smart Cities
  • Cybersecurity for Autonomous Vehicles
  • Artificial Intelligence for Fraud Detection in Financial Systems
  • Social Network Analysis for Marketing Campaigns
  • Cloud Computing for Video Game Streaming
  • Machine Learning for Speech Recognition
  • Augmented Reality for Architecture and Design
  • Natural Language Processing for Customer Service Chatbots
  • Machine Learning for Climate Change Prediction
  • Big Data Analytics for Social Sciences
  • Artificial Intelligence for Energy Management
  • Virtual Reality for Tourism and Travel
  • Cybersecurity for Smart Grids
  • Machine Learning for Image Recognition
  • Augmented Reality for Sports Training
  • Natural Language Processing for Content Creation
  • Cloud Computing for High-Performance Computing
  • Artificial Intelligence for Personalized Medicine
  • Virtual Reality for Architecture and Design
  • Augmented Reality for Product Visualization
  • Natural Language Processing for Language Translation
  • Cybersecurity for Cloud Computing
  • Artificial Intelligence for Supply Chain Optimization
  • Blockchain Technology for Digital Voting Systems
  • Virtual Reality for Job Training
  • Augmented Reality for Retail Shopping
  • Natural Language Processing for Sentiment Analysis in Customer Feedback
  • Cloud Computing for Mobile Application Development
  • Artificial Intelligence for Cybersecurity Threat Detection
  • Blockchain Technology for Intellectual Property Protection
  • Virtual Reality for Music Education
  • Machine Learning for Financial Forecasting
  • Augmented Reality for Medical Education
  • Natural Language Processing for News Summarization
  • Cybersecurity for Healthcare Data Protection
  • Artificial Intelligence for Autonomous Robots
  • Virtual Reality for Fitness and Health
  • Machine Learning for Natural Language Understanding
  • Augmented Reality for Museum Exhibits
  • Natural Language Processing for Chatbot Personality Development
  • Cloud Computing for Website Performance Optimization
  • Artificial Intelligence for E-commerce Recommendation Systems
  • Blockchain Technology for Supply Chain Traceability
  • Virtual Reality for Military Training
  • Augmented Reality for Advertising
  • Natural Language Processing for Chatbot Conversation Management
  • Cybersecurity for Cloud-Based Services
  • Artificial Intelligence for Agricultural Management
  • Blockchain Technology for Food Safety Assurance
  • Virtual Reality for Historical Reenactments
  • Machine Learning for Cybersecurity Incident Response.
  • Secure Multiparty Computation
  • Federated Learning
  • Internet of Things Security
  • Blockchain Scalability
  • Quantum Computing Algorithms
  • Explainable AI
  • Data Privacy in the Age of Big Data
  • Adversarial Machine Learning
  • Deep Reinforcement Learning
  • Online Learning and Streaming Algorithms
  • Graph Neural Networks
  • Automated Debugging and Fault Localization
  • Mobile Application Development
  • Software Engineering for Cloud Computing
  • Cryptocurrency Security
  • Edge Computing for Real-Time Applications
  • Natural Language Generation
  • Virtual and Augmented Reality
  • Computational Biology and Bioinformatics
  • Internet of Things Applications
  • Robotics and Autonomous Systems
  • Explainable Robotics
  • 3D Printing and Additive Manufacturing
  • Distributed Systems
  • Parallel Computing
  • Data Center Networking
  • Data Mining and Knowledge Discovery
  • Information Retrieval and Search Engines
  • Network Security and Privacy
  • Cloud Computing Security
  • Data Analytics for Business Intelligence
  • Neural Networks and Deep Learning
  • Reinforcement Learning for Robotics
  • Automated Planning and Scheduling
  • Evolutionary Computation and Genetic Algorithms
  • Formal Methods for Software Engineering
  • Computational Complexity Theory
  • Bio-inspired Computing
  • Computer Vision for Object Recognition
  • Automated Reasoning and Theorem Proving
  • Natural Language Understanding
  • Machine Learning for Healthcare
  • Scalable Distributed Systems
  • Sensor Networks and Internet of Things
  • Smart Grids and Energy Systems
  • Software Testing and Verification
  • Web Application Security
  • Wireless and Mobile Networks
  • Computer Architecture and Hardware Design
  • Digital Signal Processing
  • Game Theory and Mechanism Design
  • Multi-agent Systems
  • Evolutionary Robotics
  • Quantum Machine Learning
  • Computational Social Science
  • Explainable Recommender Systems.
  • Artificial Intelligence and its applications
  • Cloud computing and its benefits
  • Cybersecurity threats and solutions
  • Internet of Things and its impact on society
  • Virtual and Augmented Reality and its uses
  • Blockchain Technology and its potential in various industries
  • Web Development and Design
  • Digital Marketing and its effectiveness
  • Big Data and Analytics
  • Software Development Life Cycle
  • Gaming Development and its growth
  • Network Administration and Maintenance
  • Machine Learning and its uses
  • Data Warehousing and Mining
  • Computer Architecture and Design
  • Computer Graphics and Animation
  • Quantum Computing and its potential
  • Data Structures and Algorithms
  • Computer Vision and Image Processing
  • Robotics and its applications
  • Operating Systems and its functions
  • Information Theory and Coding
  • Compiler Design and Optimization
  • Computer Forensics and Cyber Crime Investigation
  • Distributed Computing and its significance
  • Artificial Neural Networks and Deep Learning
  • Cloud Storage and Backup
  • Programming Languages and their significance
  • Computer Simulation and Modeling
  • Computer Networks and its types
  • Information Security and its types
  • Computer-based Training and eLearning
  • Medical Imaging and its uses
  • Social Media Analysis and its applications
  • Human Resource Information Systems
  • Computer-Aided Design and Manufacturing
  • Multimedia Systems and Applications
  • Geographic Information Systems and its uses
  • Computer-Assisted Language Learning
  • Mobile Device Management and Security
  • Data Compression and its types
  • Knowledge Management Systems
  • Text Mining and its uses
  • Cyber Warfare and its consequences
  • Wireless Networks and its advantages
  • Computer Ethics and its importance
  • Computational Linguistics and its applications
  • Autonomous Systems and Robotics
  • Information Visualization and its importance
  • Geographic Information Retrieval and Mapping
  • Business Intelligence and its benefits
  • Digital Libraries and their significance
  • Artificial Life and Evolutionary Computation
  • Computer Music and its types
  • Virtual Teams and Collaboration
  • Computer Games and Learning
  • Semantic Web and its applications
  • Electronic Commerce and its advantages
  • Multimedia Databases and their significance
  • Computer Science Education and its importance
  • Computer-Assisted Translation and Interpretation
  • Ambient Intelligence and Smart Homes
  • Autonomous Agents and Multi-Agent Systems.

About the author

' src=

Muhammad Hassan

Researcher, Academic Writer, Web developer

You may also like

Funny Research Topics

200+ Funny Research Topics

Qualitative_Research_Topics

500+ Qualitative Research Titles and Topics

Criminal Justice Research Topics

500+ Criminal Justice Research Topics

Science Research Topics

300+ Science Research Topics

AP Research Topic Ideas

300+ AP Research Topic Ideas

Astronomy Research Topics

500+ Astronomy Research Topics

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

computer science research methodology example

COMPSCI 389 : Research Methods in Computer Science

2022 semester two (1225) (15 points), course prescription, course overview.

This course is an overview of research methods and techniques used across Computer Science, including formal proof techniques and empirical methods that involve quantitative and/or qualitative data. Students will be expected to apply the research methods approach to develop a research proposal for a Computer Science research topic of their choice. Students will investigate a computing topic relevant to social or environmental responsibility in groups. The course finishes with a debate on a topic pertinent to the discipline.

Course Requirements

Capabilities developed in this course.

Capability 1: Disciplinary Knowledge and Practice
Capability 2: Critical Thinking
Capability 3: Solution Seeking
Capability 4: Communication and Engagement
Capability 5: Independence and Integrity
Capability 6: Social and Environmental Responsibilities

Learning Outcomes

  • Describe the most common and well-established research methods employed in computer science research (Capability 1)
  • Write an effective and feasible research proposal (Capability 1, 2, 3 and 5)
  • Formulate an original and sound argument with scientific claims that are effectively supported by empirical evidence and/or formal constructions (proofs) (Capability 1, 2 and 5)
  • Use electronic systems of bibliographic citation (Capability 1 and 5)
  • Engage effectively in a peer-review review process of a piece of computer science research, both as a reviewer and reviewee (Capability 1 and 2)
  • Engage productively in collaborative research that engages with a set of collaborators that is diverse culturally and/or in their areas of expertise on a topic relevant to social or environmental responsibility. (Capability 1, 3, 4, 5 and 6)
  • Effectively communicate the results of a research project, by way of a poster and or presentation. (Capability 4 and 5)

Assessments

Assessment Type Percentage Classification
Research proposal 15% Individual Coursework
Peer review 15% Individual Coursework
Test 20% Individual Test
Research report 20% Individual Coursework
Reflection 10% Individual Coursework
Presentation 10% Individual Coursework
Research poster 10% Individual Coursework
7 types 100%
Assessment Type Learning Outcome Addressed
1 2 3 4 5 6 7
Research proposal
Peer review
Test
Research report
Reflection
Presentation
Research poster

Special Requirements

Not applicable

Workload Expectations

This course is a standard 15 point course and students are expected to spend 10 hours per week involved in each 15 point course that they are enrolled in.

For this course you can expect 24 hours of contact hours, 82 hours assignments and test preparation, and 44 hours self-directed learning.

Delivery Mode

Campus experience.

Attendance is expected at scheduled activities including tutorials to complete components of the course. Lectures will be available as recordings. Other learning activities including seminars/tutorials will not be available as recordings. The course will include live online events including group discussions/tutorials. Attendance on campus is required for the test. The activities for the course are scheduled as a standard weekly timetable.

Learning Resources

Course materials are made available in a learning and collaboration tool called Canvas which also includes reading lists and lecture recordings (where available).

Please remember that the recording of any class on a personal device requires the permission of the instructor.

Student Feedback

During the course Class Representatives in each class can take feedback to the staff responsible for the course and staff-student consultative committees.

At the end of the course students will be invited to give feedback on the course and teaching through a tool called SET or Qualtrics. The lecturers and course co-ordinators will consider all feedback.

Your feedback helps to improve the course and its delivery for all students.

Academic Integrity

The University of Auckland will not tolerate cheating, or assisting others to cheat, and views cheating in coursework as a serious academic offence. The work that a student submits for grading must be the student's own work, reflecting their learning. Where work from other sources is used, it must be properly acknowledged and referenced. This requirement also applies to sources on the internet. A student's assessed work may be reviewed against online source material using computerised detection mechanisms.

Class Representatives

Class representatives are students tasked with representing student issues to departments, faculties, and the wider university. If you have a complaint about this course, please contact your class rep who will know how to raise it in the right channels. See your departmental noticeboard for contact details for your class reps.

The content and delivery of content in this course are protected by copyright. Material belonging to others may have been used in this course and copied by and solely for the educational purposes of the University under license.

You may copy the course content for the purposes of private study or research, but you may not upload onto any third party site, make a further copy or sell, alter or further reproduce or distribute any part of the course content to another person.

Inclusive Learning

All students are asked to discuss any impairment related requirements privately, face to face and/or in written form with the course coordinator, lecturer or tutor.

Student Disability Services also provides support for students with a wide range of impairments, both visible and invisible, to succeed and excel at the University. For more information and contact details, please visit the Student Disability Services’ website http://disability.auckland.ac.nz

Special Circumstances

If your ability to complete assessed coursework is affected by illness or other personal circumstances outside of your control, contact a member of teaching staff as soon as possible before the assessment is due.

If your personal circumstances significantly affect your performance, or preparation, for an exam or eligible written test, refer to the University’s aegrotat or compassionate consideration page https://www.auckland.ac.nz/en/students/academic-information/exams-and-final-results/during-exams/aegrotat-and-compassionate-consideration.html .

This should be done as soon as possible and no later than seven days after the affected test or exam date.

Learning Continuity

In the event of an unexpected disruption, we undertake to maintain the continuity and standard of teaching and learning in all your courses throughout the year. If there are unexpected disruptions the University has contingency plans to ensure that access to your course continues and course assessment continues to meet the principles of the University’s assessment policy. Some adjustments may need to be made in emergencies. You will be kept fully informed by your course co-ordinator/director, and if disruption occurs you should refer to the university website for information about how to proceed.

The delivery mode may change depending on COVID restrictions. Any changes will be communicated through Canvas.

Student Charter and Responsibilities

The Student Charter assumes and acknowledges that students are active participants in the learning process and that they have responsibilities to the institution and the international community of scholars. The University expects that students will act at all times in a way that demonstrates respect for the rights of other students and staff so that the learning environment is both safe and productive. For further information visit Student Charter https://www.auckland.ac.nz/en/students/forms-policies-and-guidelines/student-policies-and-guidelines/student-charter.html .

Elements of this outline may be subject to change. The latest information about the course will be available for enrolled students in Canvas.

In this course students may be asked to submit coursework assessments digitally. The University reserves the right to conduct scheduled tests and examinations for this course online or through the use of computers or other electronic devices. Where tests or examinations are conducted online remote invigilation arrangements may be used. In exceptional circumstances changes to elements of this course may be necessary at short notice. Students enrolled in this course will be informed of any such changes and the reasons for them, as soon as possible, through Canvas.

computer science research methodology example

Research Topics & Ideas: CompSci & IT

50+ Computer Science Research Topic Ideas To Fast-Track Your Project

IT & Computer Science Research Topics

Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you’ve landed on this post, chances are you’re looking for a computer science-related research topic , but aren’t sure where to start. Here, we’ll explore a variety of CompSci & IT-related research ideas and topic thought-starters, including algorithms, AI, networking, database systems, UX, information security and software engineering.

NB – This is just the start…

The topic ideation and evaluation process has multiple steps . In this post, we’ll kickstart the process by sharing some research topic ideas within the CompSci domain. This is the starting point, but to develop a well-defined research topic, you’ll need to identify a clear and convincing research gap , along with a well-justified plan of action to fill that gap.

If you’re new to the oftentimes perplexing world of research, or if this is your first time undertaking a formal academic research project, be sure to check out our free dissertation mini-course. In it, we cover the process of writing a dissertation or thesis from start to end. Be sure to also sign up for our free webinar that explores how to find a high-quality research topic. 

Overview: CompSci Research Topics

  • Algorithms & data structures
  • Artificial intelligence ( AI )
  • Computer networking
  • Database systems
  • Human-computer interaction
  • Information security (IS)
  • Software engineering
  • Examples of CompSci dissertation & theses

Topics/Ideas: Algorithms & Data Structures

  • An analysis of neural network algorithms’ accuracy for processing consumer purchase patterns
  • A systematic review of the impact of graph algorithms on data analysis and discovery in social media network analysis
  • An evaluation of machine learning algorithms used for recommender systems in streaming services
  • A review of approximation algorithm approaches for solving NP-hard problems
  • An analysis of parallel algorithms for high-performance computing of genomic data
  • The influence of data structures on optimal algorithm design and performance in Fintech
  • A Survey of algorithms applied in internet of things (IoT) systems in supply-chain management
  • A comparison of streaming algorithm performance for the detection of elephant flows
  • A systematic review and evaluation of machine learning algorithms used in facial pattern recognition
  • Exploring the performance of a decision tree-based approach for optimizing stock purchase decisions
  • Assessing the importance of complete and representative training datasets in Agricultural machine learning based decision making.
  • A Comparison of Deep learning algorithms performance for structured and unstructured datasets with “rare cases”
  • A systematic review of noise reduction best practices for machine learning algorithms in geoinformatics.
  • Exploring the feasibility of applying information theory to feature extraction in retail datasets.
  • Assessing the use case of neural network algorithms for image analysis in biodiversity assessment

Topics & Ideas: Artificial Intelligence (AI)

  • Applying deep learning algorithms for speech recognition in speech-impaired children
  • A review of the impact of artificial intelligence on decision-making processes in stock valuation
  • An evaluation of reinforcement learning algorithms used in the production of video games
  • An exploration of key developments in natural language processing and how they impacted the evolution of Chabots.
  • An analysis of the ethical and social implications of artificial intelligence-based automated marking
  • The influence of large-scale GIS datasets on artificial intelligence and machine learning developments
  • An examination of the use of artificial intelligence in orthopaedic surgery
  • The impact of explainable artificial intelligence (XAI) on transparency and trust in supply chain management
  • An evaluation of the role of artificial intelligence in financial forecasting and risk management in cryptocurrency
  • A meta-analysis of deep learning algorithm performance in predicting and cyber attacks in schools

Research topic idea mega list

Topics & Ideas: Networking

  • An analysis of the impact of 5G technology on internet penetration in rural Tanzania
  • Assessing the role of software-defined networking (SDN) in modern cloud-based computing
  • A critical analysis of network security and privacy concerns associated with Industry 4.0 investment in healthcare.
  • Exploring the influence of cloud computing on security risks in fintech.
  • An examination of the use of network function virtualization (NFV) in telecom networks in Southern America
  • Assessing the impact of edge computing on network architecture and design in IoT-based manufacturing
  • An evaluation of the challenges and opportunities in 6G wireless network adoption
  • The role of network congestion control algorithms in improving network performance on streaming platforms
  • An analysis of network coding-based approaches for data security
  • Assessing the impact of network topology on network performance and reliability in IoT-based workspaces

Free Webinar: How To Find A Dissertation Research Topic

Topics & Ideas: Database Systems

  • An analysis of big data management systems and technologies used in B2B marketing
  • The impact of NoSQL databases on data management and analysis in smart cities
  • An evaluation of the security and privacy concerns of cloud-based databases in financial organisations
  • Exploring the role of data warehousing and business intelligence in global consultancies
  • An analysis of the use of graph databases for data modelling and analysis in recommendation systems
  • The influence of the Internet of Things (IoT) on database design and management in the retail grocery industry
  • An examination of the challenges and opportunities of distributed databases in supply chain management
  • Assessing the impact of data compression algorithms on database performance and scalability in cloud computing
  • An evaluation of the use of in-memory databases for real-time data processing in patient monitoring
  • Comparing the effects of database tuning and optimization approaches in improving database performance and efficiency in omnichannel retailing

Topics & Ideas: Human-Computer Interaction

  • An analysis of the impact of mobile technology on human-computer interaction prevalence in adolescent men
  • An exploration of how artificial intelligence is changing human-computer interaction patterns in children
  • An evaluation of the usability and accessibility of web-based systems for CRM in the fast fashion retail sector
  • Assessing the influence of virtual and augmented reality on consumer purchasing patterns
  • An examination of the use of gesture-based interfaces in architecture
  • Exploring the impact of ease of use in wearable technology on geriatric user
  • Evaluating the ramifications of gamification in the Metaverse
  • A systematic review of user experience (UX) design advances associated with Augmented Reality
  • A comparison of natural language processing algorithms automation of customer response Comparing end-user perceptions of natural language processing algorithms for automated customer response
  • Analysing the impact of voice-based interfaces on purchase practices in the fast food industry

Research Topic Kickstarter - Need Help Finding A Research Topic?

Topics & Ideas: Information Security

  • A bibliometric review of current trends in cryptography for secure communication
  • An analysis of secure multi-party computation protocols and their applications in cloud-based computing
  • An investigation of the security of blockchain technology in patient health record tracking
  • A comparative study of symmetric and asymmetric encryption algorithms for instant text messaging
  • A systematic review of secure data storage solutions used for cloud computing in the fintech industry
  • An analysis of intrusion detection and prevention systems used in the healthcare sector
  • Assessing security best practices for IoT devices in political offices
  • An investigation into the role social media played in shifting regulations related to privacy and the protection of personal data
  • A comparative study of digital signature schemes adoption in property transfers
  • An assessment of the security of secure wireless communication systems used in tertiary institutions

Topics & Ideas: Software Engineering

  • A study of agile software development methodologies and their impact on project success in pharmacology
  • Investigating the impacts of software refactoring techniques and tools in blockchain-based developments
  • A study of the impact of DevOps practices on software development and delivery in the healthcare sector
  • An analysis of software architecture patterns and their impact on the maintainability and scalability of cloud-based offerings
  • A study of the impact of artificial intelligence and machine learning on software engineering practices in the education sector
  • An investigation of software testing techniques and methodologies for subscription-based offerings
  • A review of software security practices and techniques for protecting against phishing attacks from social media
  • An analysis of the impact of cloud computing on the rate of software development and deployment in the manufacturing sector
  • Exploring the impact of software development outsourcing on project success in multinational contexts
  • An investigation into the effect of poor software documentation on app success in the retail sector

CompSci & IT Dissertations/Theses

While the ideas we’ve presented above are a decent starting point for finding a CompSci-related research topic, they are fairly generic and non-specific. So, it helps to look at actual dissertations and theses to see how this all comes together.

Below, we’ve included a selection of research projects from various CompSci-related degree programs to help refine your thinking. These are actual dissertations and theses, written as part of Master’s and PhD-level programs, so they can provide some useful insight as to what a research topic looks like in practice.

  • An array-based optimization framework for query processing and data analytics (Chen, 2021)
  • Dynamic Object Partitioning and replication for cooperative cache (Asad, 2021)
  • Embedding constructural documentation in unit tests (Nassif, 2019)
  • PLASA | Programming Language for Synchronous Agents (Kilaru, 2019)
  • Healthcare Data Authentication using Deep Neural Network (Sekar, 2020)
  • Virtual Reality System for Planetary Surface Visualization and Analysis (Quach, 2019)
  • Artificial neural networks to predict share prices on the Johannesburg stock exchange (Pyon, 2021)
  • Predicting household poverty with machine learning methods: the case of Malawi (Chinyama, 2022)
  • Investigating user experience and bias mitigation of the multi-modal retrieval of historical data (Singh, 2021)
  • Detection of HTTPS malware traffic without decryption (Nyathi, 2022)
  • Redefining privacy: case study of smart health applications (Al-Zyoud, 2019)
  • A state-based approach to context modeling and computing (Yue, 2019)
  • A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks (Solomon, 2019)
  • HRSB-Tree for Spatio-Temporal Aggregates over Moving Regions (Paduri, 2019)

Looking at these titles, you can probably pick up that the research topics here are quite specific and narrowly-focused , compared to the generic ones presented earlier. This is an important thing to keep in mind as you develop your own research topic. That is to say, to create a top-notch research topic, you must be precise and target a specific context with specific variables of interest . In other words, you need to identify a clear, well-justified research gap.

Fast-Track Your Research Topic

If you’re still feeling a bit unsure about how to find a research topic for your Computer Science dissertation or research project, check out our Topic Kickstarter service.

Ernest Joseph

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments.

Steps on getting this project topic

Joseph

I want to work with this topic, am requesting materials to guide.

Yadessa Dugassa

Information Technology -MSc program

Andrew Itodo

It’s really interesting but how can I have access to the materials to guide me through my work?

Sorie A. Turay

That’s my problem also.

kumar

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments is in my favour. May i get the proper material about that ?

BEATRICE OSAMEGBE

BLOCKCHAIN TECHNOLOGY

Nanbon Temasgen

I NEED TOPIC

Andrew Alafassi

Database Management Systems

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • Print Friendly

Research on the Effects of the Case Teaching Model Based on the action method and OBE Concept in Secondary Vocational Education

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, index terms.

General and reference

Cross-computing tools and techniques

Empirical studies

Recommendations

Research on the path of preschool education curriculum system construction under obe teaching concept.

Based on the OBE teaching philosophy, the construction of a practical teaching goal system with the cultivation of students' practical ability in nursing and education as the core is the construction path of the college preschool education curriculum ...

The Reform of College English Teaching Model under the OBE Teaching Concept

The core of the OBE concept is student-centered, results-oriented, continuous improvement, and curriculum reform embodied in the talent training program. Therefore, the introduction of OBE education concept into the training of college English ...

Research on the i-Experiment Teaching Model in Vocational Education

Online education and on-site campus education have been developing from separate to integrated. Through the construction of the i-Experiment Teaching Model for Vocational Education, "i" is connected with the "love" for knowledge and practice to explore ...

Information

Published in.

cover image ACM Other conferences

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates.

  • Research-article
  • Refereed limited

Contributors

Other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

HTML Format

View this article in HTML Format.

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

IMAGES

  1. [PDF] Methodologies in Computer Science and Information Systems

    computer science research methodology example

  2. Different types of computer science research in the general area of

    computer science research methodology example

  3. (PDF) Research methods in computer science

    computer science research methodology example

  4. (PDF) Introducing research methods to computer science Honours students

    computer science research methodology example

  5. PPT

    computer science research methodology example

  6. Types of Research Methodology

    computer science research methodology example

VIDEO

  1. Research Methodology in Computer Science Team 17 Presentation

  2. Research Methodology in Computer Science Presentation Kelompok 2

  3. Research Design & Question

  4. Design Science Research Methodology (DSRM)

  5. Indian Institute of Science

  6. Reaearch Methods vs Research Methodology in Hindi Urdu Lecture 16

COMMENTS

  1. Research methodology for computer science

    Research methodology for computer science. This paper aims to provide an understanding of the basis for conducting a research with output in the form of scientific publications. A study, from proposal to scientific works, requires a research methodology. Many studies have been carried out on methodology, but few have returned according to the ...

  2. PDF Research Methods in Computer Science

    Classifying research (1) Research can be classified from three different perspectives: Field Position of the research within a hierarchy of topics. Example: Artificial Intelligence → Automated Reasoning → First-Order Reasoning → Decidability. Approach Research methods that are employed as part of the research process. Examples:

  3. PDF Research Methods in Computing: Introduction

    This course is designed for post-graduate students in computing science and has three interlinked objective: First, to describe the distinctive nature of research in computing, a subject with substantive application and significant intellectual challenge. Second, to introduce the students to the emerging discipline of knowledge management so ...

  4. PDF About Computing Science Research Methodology

    1.1 Formal Methodology A formal methodology is most frequently used in theoretical Computing Science. Johnson states that Theoretical Computer Science (TCS) is the science that supports the eld of computing [1]. TCS is formal and mathematical and it is mostly concerned with modeling and abstraction.

  5. PDF Introduction SCC5933 Research Methodology in Computer Science

    Modern computer science was born with such types of research, in the decades of 1930-1940. First themes were: computability, algorithms, complexity, information theory, optimization, artificial intelligence, etc. Alan Turing. On computable numbers, with an application to the Entscheidungsproblem. Proc.

  6. PDF The Research Process in Computer Science

    the eld of computer science. Chief among these include the following: |formal |experimental |build We will brie y explore each of these research methods, along with their common pitfalls when applicable. 3.1. Formal Methodology A "formal methodology" is the most frequently used in theoretical computer science (this

  7. PDF Research Methods in Computer Science

    better grasp on what exactly is "good" research. We explore the role of research methods in computer science, draw-ing upon practical examples from empirical approaches in software engineering. Given the need for stronger research methods (Section I) and the ongoing pressure on publication output (Section II) the tutorial wants PhD students ...

  8. PDF Research Methods in Computer Science

    Research (Dictionary) Scholarly or scientific investigation or inquiry. Close, careful study. 1 To study (something) thoroughly so as to present in a detailed, accurate manner. (Example: researching the effects of acid rain.) Note the difference between the definition of the noun and of the verb.

  9. Tutorial: Research Methods in Computer Science

    The tutorial "Research Methods in Computer Science" is a concrete result of the sabbatical leave at the University of Züurich in the research group SEAL. Below is a short chronological overview of how the tutorial evolved into its current incarnation. PhD symposium at University of Zürich. Prof. Serge Demeyer organised a Phd symposium using ...

  10. A guideline for the methodology chapter in computer science dissertations

    Rather than simply offering suggestions, this guideline for the methodology chapter in computer science dissertations provides thorough insights on how to develop a strong research methodology within the area of computer science. The method is structured into several parts starting with an overview of research strategies which include experiments, surveys, interviews and case studies. The ...

  11. (PDF) Research Methods in Computer Science

    Researchers, in the field of computer science and engineering, may view the research process in a. way depicted by Figure 1. There is an experimenter in a middle of the research field trying to ...

  12. CSC2130 Empirical Research Methods for Computer Scientists

    This course will explore the role of empiricism in computer science research, and will prepare students for advanced research by examining how to plan, conduct and report on empirical investigations. ... and critically review published examples of work that used each of the principle methods in computer science. ... Sample Size; Read these ...

  13. (PDF) Research methods in computer science

    Computer Science as a research discipline has always struggled with its identity. On the one hand, it is a field deeply rooted in mathematics which resulted in strong theories.1 For example, there ...

  14. Research Techniques for Computer Science, Information Systems and

    The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative ...

  15. CS908 Research Methods

    Module aims. The module will assist students in the various stages involved in undertaking a substantial research project, covering: researching and choosing a topic, finding a supervisor, writing a research proposal, narrowing the scope of the project, planning, researching, writing and finally submitting their dissertation.

  16. Research Methods in Computer Science: The Challenges and Issues

    Research methods are essential parts in conducting any research project. Although they have been theorized and summarized based on best practices, every field of science requires an adaptation of the overall approaches to perform research activities. In addition, any specific research needs a particular adjustment to the generalized approach and specializing them to suit the project in hand ...

  17. Research in computer science: an empirical study

    In addition, we are aware of two papers that address research methods in both computer science and software engineering. Glass (1995), for example, suggested a fairly simplistic approach, derived from prior literature, which categorized methods as scientific, engineering, empirical, and analytical.

  18. Computer Science Research Methodologies

    This is a collection of notes I have accumulated regarding research method-ologies, especially for the use of my project students. It is a document mainly directed for my students, and not an official document by the department of computer science. 1 Definition of Research Methodology Definition (private communication by Markus Roggenbach) The methodology is the general strategy that outlines ...

  19. 500+ Computer Science Research Topics

    Computer Science Research Topics are as follows: Using machine learning to detect and prevent cyber attacks. Developing algorithms for optimized resource allocation in cloud computing. Investigating the use of blockchain technology for secure and decentralized data storage. Developing intelligent chatbots for customer service.

  20. Research methods in computer science

    Research methods in computer science Abstract: Computer Science as a research discipline has always struggled with its identity. On the one hand, it is a field deeply rooted in mathematics which resulted in strong theories. 1 For example, there is computational complexity theory (turing machines, the halting problem), database theory (the ...

  21. COMPSCI 389 : Research Methods in Computer Science

    Course Overview. This course is an overview of research methods and techniques used across Computer Science, including formal proof techniques and empirical methods that involve quantitative and/or qualitative data. Students will be expected to apply the research methods approach to develop a research proposal for a Computer Science research ...

  22. Research methods in computing: what are they, and how should we teach

    We integrate our structure with a model for the process a learner goes through on the way to becoming an expert computing researcher and offer example learning activities that represent a growing repository of course materials meant to aid those wishing to teach research skills to computing students.Our model is designed to ground discussion of ...

  23. Computer Science Research Topics (+ Free Webinar)

    Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you've landed on this post, chances are you're looking for a computer science-related research topic, but aren't sure where to start.Here, we'll explore a variety of CompSci & IT-related research ideas and topic thought-starters ...

  24. Research on the Effects of the Case Teaching Model Based on the action

    Research on the Effects of the Case Teaching Model Based on the action method and OBE Concept in Secondary Vocational Education ... Li C, Gu Y. 2020. The application of case teaching method in computer English teaching under OBE mode——taking college English blending teaching of Hetao college as an example," In: E3S web of conferences, vol ...