The MSCS offers excellent curriculum that blends theoretic foundations of computer science with the state-of-the-art computing technologies. The program provides students with opportunities in computer science research, advanced project development and interdisciplinary study, with maximum of flexibility in study plans and class attendance options.
- 1. Curriculum featuring the state-of-the-art computing technologies:
- Mobile computing, mobile app development, wireless networking
- Game design and development, modeling, and simulation
- Database, data warehousing, and data mining
- Cloud computing, high performance computing, distributed computing
- Computing security
- 2. Three degree models
- Thesis model
- Non-thesis model
- Interdisciplinary CS model
- 4+1 BS/MS Accelerated Plan
- 4+1.5 BS/MS Accelerated Plan, with part-time MSCS
3. Full time/part time study plans and flexible class attendance options
- 4. KSU BS/MS Accelerated Plan
5. Closely working with faculty in research and project development
Time to Submit Your Thesis?Theses from 2020
Fast Clustering Using a Grid-Based Underlying Density Function Approximation, Daniel Brown
Improving the Maximum Power Point Tracking Efficiency of Photovoltaic Arrays via Machine Learning and Deep Learning, Sumedha Inamdar
SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns, Daniel Karasek
Deep Learning for Identifying Breast Cancer, Yihong Li
The Trend Of Digital Currency By Mining And Analysis Of Patent, Feiyang Qu
A FEDERATED DEEP AUTOENCODER FOR DETECTING IOT CYBER ATTACKS, Christopher M. Regan
Deep learning for identifying Lung Diseases, Lin Wang
An Unsupervised Anomaly Detection Framework for Detecting Anomalies in Real Time through Network System’s Log Files Analysis, Vannel Zeufack
Theses from 2019
A Constrained Box Algorithm for Imbalanced Data in Remote Sensing Images, Wajira Abeysinghe
American Sign Language Recognition Using Machine Learning and Computer Vision, Kshitij Bantupalli and Ying Xie
Compliance of Open Source EHR Applications with HIPAA and ONC Security and Privacy Requirements, Maryam Farhadi, Hisham Haddad, and Hossain Shahriar
KNN Optimization for Multi-Dimensional Data, Arialdis Japa
Document Layout Analysis and Recognition Systems, Sai Kosaraju
DEVELOPMENT OF SPATIOTEMPORAL CONGESTION PATTERN OBSERVATION MODEL USING HISTORICAL AND NEAR REAL TIME DATA, Betty Kretlow
Finding a Viable Neural Network Architecture for Use with Upper Limb Prosthetics, Maxwell Lavin
LUNG PATTERN CLASSIFICATION VIA DCNN, Zhuoqi Sun
Texture-based Deep Neural Network for Histopathology Cancer Whole Slide Image (WSI) Classification, NELSON Zange TSAKU
DESIGNING VISUALLY INTERACTIVE LEARNING MODULES TO PROMOTE STUDENTS' CRITICAL THINKING IN MATHEMATICS, Linda Vu and Ying Xie
Theses from 2018
Implementation of Secure DNP3 Architecture of SCADA System for Smart Grids, Uday Bhaskar Boyanapalli
Improvement of Decision on Coding Unit Split Mode and Intra-Picture Prediction by Machine Learning, Wenchan Jiang
AUTOMATIC IDENTIFICATION OF ANIMALS IN THE WILD: A COMPARATIVE STUDY BETWEEN C-CAPSULE NETWORKS AND DEEP CONVOLUTIONAL NEURAL NETWORKS., Joel Kamdem Teto and Ying Xie
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis, Euiseong Ko
A Multiple Classifier System for Predicting Best-Selling Amazon Products, Michael Kranzlein
Malware Image Classification using Machine Learning with Local Binary Pattern, Jhu-Sin Luo and Dan Lo
Identifying Cancer Subtypes Using Unsupervised Deep Learning, Tejaswini Mallavarapu
Static Analysis of Android Secure Application Development Process with FindSecurityBugs, Xianyong Meng
Virtual Reality as Navigation Tool: Creating Interactive Environments For Individuals With Visual Impairments, Nick Murphy
An IoT System for Converting Handwritten Text to Editable Format via Gesture Recognition, Nidhi patel
NEW ALGORITHMS FOR COMPRESSED SENSING OF MRI: WTWTS, DWTS, WDWTS, Srivarna Settisara Janney
Theses from 2017
On Intelligent Mitigation of Process Starvation In Multilevel Feedback Queue Scheduling, Joseph E. Brown
Feature Selection and Improving Classification Performance for Malware Detection, Carlos A. Cepeda Mora
CLASSIFICATION OF IMAGES BASED ON PIXELS THAT REPRESENT A SMALL PART OF THE SCENE. A CASE APPLIED TO MICROANEURYSMS IN FUNDUS RETINA IMAGES, Pablo F. Ordonez and Pablo F. Ordonez
Theses from 2016
Internet of Things-Based Smart Classroom Environment, Amir R. Atabekov
Improving the Prediction Accuracy of Text Data and Attribute Data Mining with Data Preprocessing, PRIYANGA CHANDRASEKAR
Comparative Study of Dimension Reduction Approaches With Respect to Visualization in 3-Dimensional Space, Pooja Chenna
Color Image Segmentation Using the Bee Algorithm in the Markovian Framework, Vehbi Dragaj
Definition of a Method for the Formulation of Problems to be Solved with High Performance Computing, Ramya Peruri
Theses from 2015
Detection of Lightweight Directory Access Protocol Query Injection Attacks in Web Applications, Pranahita Bulusu
Formal Specification Driven Development, Titus Fofung
Blocking Negative Influential Node Set in Social Networks: From Host Perspective, Harneet Kaur
Theses/Dissertations from 2014
Tapjacking Threats and Mitigation Techniques for Android Applications, Vanessa Cooper