Write a paper in one of your interested operating systems including Windows, Linux/Unix, Mac OS, iOS, Android, Windows mobile phone, and/or relevant device security and forensics issues.
Use the search engines to search for technical papers on the topic of your choice. Make sure that the papers were published within the last 5 years.
List all the papers as references at the end of your documentation.
In your report, you should include this following section: a. Existing Algorithms -- discussing their pros and con.