{"id":1449,"date":"2023-04-17T06:26:06","date_gmt":"2023-04-17T06:26:06","guid":{"rendered":"http:\/\/e-academy.com.pk\/cms\/?page_id=1449"},"modified":"2023-04-17T06:26:58","modified_gmt":"2023-04-17T06:26:58","slug":"guidance","status":"publish","type":"page","link":"http:\/\/e-academy.com.pk\/cms\/?page_id=1449","title":{"rendered":"Guidance"},"content":{"rendered":"<p>We have received requests for guidelines to pursue a PhD degree in Computer Science at Pakistan.<\/p>\n<p>We would suggest following fields for PhD in computer Science.<\/p>\n<p>1\tA study on robotic interaction with liquids.<br \/>\n2\tAI and robotics.<br \/>\n3\tAlgorithmic mechanism design, algorithmic game theory, approximation algorithms.<br \/>\n4\tArt and math modelling in computers and media.<br \/>\n5\tAssurance in computer security and information.<br \/>\n6\tAutomating data analyses using Artifical Intelligence.<br \/>\n7\tBanking security and ATMs.<br \/>\n8\tChemistry\u2019s informatics research.<br \/>\n9\tCognitive radio networks.<br \/>\n10\tCompiler optimization and embedded systems.<br \/>\n11\tComputational biology and machine learning.<br \/>\n12\tComputer architecture and deep learning systems.<br \/>\n13\tComputer science, biotechnology, and medicine.<br \/>\n14\tComputer techniques in photography.<br \/>\n15\tComputer vision, graphics and animation.<br \/>\n16\tCyber-physical systems.<br \/>\n17\tDatabase Queries and their automated reasoning.<br \/>\n18\tDatabases and information retrieval systems.<br \/>\n19\tDecryption, and encryption of data.<br \/>\n20\tDistributed Data Clustering.<br \/>\n21\tDistributed systems and networks.<br \/>\n22\tE-Heath data privacy concerns.<br \/>\n23\tEnhancement of Mobile App Accessibility.<br \/>\n24\tEnhancing systems using ML.<br \/>\n25\tEnhancing the usability of chatbots.<br \/>\n26\tEpitomic analyses for facial detection.<br \/>\n27\tEthical hacking: white hat techniques.<br \/>\n28\tExcavating and analyzing information from text.<br \/>\n29\tExigency computer systems for meteorology and disaster prevention.<br \/>\n30\tFacial and emotional identification.<br \/>\n31\tFuture of 5G wireless systems.<br \/>\n32\tGeo informational systems, databases, and data mining.<br \/>\n33\tGraphical interactive is debugging for distributed systems.<br \/>\n34\tHardware and architecture.<br \/>\n35\tHazards of computer viruses.<br \/>\n36\tHigh performance computing and computational science.<br \/>\n37\tHigh-performance computing.<br \/>\n38\tHow are antivirus software written?<br \/>\n39\tHow child programmers cope with dyslexia.<br \/>\n40\tHow is open source competing with paid software?<br \/>\n41\tHow successful is computer-aided learning?<br \/>\n42\tHuman perception and virtual reality\u2014what\u2019s the connection?<br \/>\n43\tHuman-computer problem-solving.<br \/>\n44\tHumanoid robot and imitation.<br \/>\n45\tImage retrieval systems\u2014content based.<br \/>\n46\tInteractive systems for scalable visual analysis.<br \/>\n47\tIs scrum methodology the best of best?<br \/>\n48\tKnowing the trials in Development Data Pipeline.<br \/>\n49\tLeveraging asynchronous FPGAs for crypto acceleration.<br \/>\n50\tMachine learning and neuron networks.<br \/>\n51\tMedia security: basic techniques.<br \/>\n52\tMedical applications and bioinformatics.<br \/>\n53\tMerits and demerits of cloud storage.<br \/>\n54\tMobile Systems and Wireless networks.<br \/>\n55\tMobile systems, computing for global development<br \/>\n56\tMobile systems.<br \/>\n57\tMoving from Passwords to Authenticators.<br \/>\n58\tNatural language processing.<br \/>\n59\tNatural life issues processing.<br \/>\n60\tNetwork Security and Cryptography.<br \/>\n61\tNetworking and security.<br \/>\n62\tNew wave in biometric systems.<br \/>\n63\tPassword systems that are mind controlled.<br \/>\n64\tPeer-to-peer confidentiality in social applications.<br \/>\n65\tProgramming languages and software systems.<br \/>\n66\tProgramming languages that are on the verge of death.<br \/>\n67\tQueuing models: simulation and comparison.<br \/>\n68\tResearch in wireless sensor networks.<br \/>\n69\tResearch on how AI and deep learning are changing the healthcare industry.<br \/>\n70\tRobotic manipulation modelling.<br \/>\n71\tRole of computers in digital forensics.<br \/>\n72\tRole of human-computer interaction.<br \/>\n73\tRole of the blockchain.<br \/>\n74\tScalable and automated ML systems.<br \/>\n75\tScaling up program verification and synthesis.<br \/>\n76\tSearch and annotation in the virtual arena. Googling 3-D space.<br \/>\n77\tSecuring data during transmission and storage.<br \/>\n78\tSecurity, privacy of augmented reality.<br \/>\n79\tSoftware development for portable gadgets.<br \/>\n80\tSoftware engineering and programming.<br \/>\n81\tStructured deep visual models for robot manipulation.<br \/>\n82\tSynthesis and program verification.<br \/>\n83\tTheory and algorithms.<br \/>\n84\tTransporting MMwave links through the internet.<br \/>\n85\tUbiquitous Computing.<br \/>\n86\tUsability in human-computer interactions.<br \/>\n87\tVerification and accessibility of webpage layouts.<br \/>\n88\tVerified Distributed Systems.<br \/>\n89\tWeb-based health monitoring and textual mining.<br \/>\n90\tWhat next in search algorithms?<br \/>\n91\t3-D object modelling.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have received requests for guidelines to pursue a PhD degree in Computer Science at Pakistan. We would suggest following fields for PhD in computer Science. 1 A study on robotic interaction with liquids. 2 AI and robotics. 3 Algorithmic mechanism design, algorithmic game theory, approximation algorithms. 4 Art and math modelling in computers and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1166,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1449","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=\/wp\/v2\/pages\/1449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1449"}],"version-history":[{"count":1,"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=\/wp\/v2\/pages\/1449\/revisions"}],"predecessor-version":[{"id":1450,"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=\/wp\/v2\/pages\/1449\/revisions\/1450"}],"up":[{"embeddable":true,"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=\/wp\/v2\/pages\/1166"}],"wp:attachment":[{"href":"http:\/\/e-academy.com.pk\/cms\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}