Advanced Research Topics in Computer Science Report 2022
VerifiedAdded on 2022/08/29
|12
|3684
|21
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RUNNING HEAD: ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 0
ADVANCED RESEARCH
TOPICS IN COMPUTER
SCIENCE
Report
ADVANCED RESEARCH
TOPICS IN COMPUTER
SCIENCE
Report
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 1
Table of Contents
Human robot interaction........................................................................................................................2
Cloud computing...................................................................................................................................2
Big data mining social data mining.......................................................................................................2
Big data analytics..................................................................................................................................3
References.............................................................................................................................................3
Table of Contents
Human robot interaction........................................................................................................................2
Cloud computing...................................................................................................................................2
Big data mining social data mining.......................................................................................................2
Big data analytics..................................................................................................................................3
References.............................................................................................................................................3
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 2
Human-robot interaction
Presented by (the lecturer’s name)
Research area:
Many organizations have used robotics for managing their work, which has improved the productivity
and performance of the organization. Thus, it is a basic need for automation to create interaction
between robots and human, which will be provided with better outcomes. In addition, there are many
things to improve in the field of automation and robotics including human interaction. There are many
approaches to artificial intelligence (AI), which can be used for managing various things. AI can be
used to improve human-robot interaction, which is better for improvement (Argall & Billard, 2010).
Human is sensitive to some works. Thus, robots can be used to manage many works, which are
dangerous for humans, such as critical works in mining industries.
Relation to Computer Science in general: it is related to machine learning and AI, which is highly
used for managing various things. It can relate to emerging technologies, which are the basic needs of
the system. Robotics is a part of Computer science, as it has created based on algorithms and different
techniques (Mavridis, 2015).
Research questions and methods:
Robotics is a huge field for research work, but it should be in ethical considerations. There are some
issues related to system design and manufacturing, which make a huge impact on design as well.
Research organizations should work in a limit, which is harmless devices and equipment. In addition,
there are some basic ideas behind the research work in the field of human-robot interaction. Robotics
can be impacted the human as well, thus, it should be managed properly (Sheridan, 2016). There are
many surveys to understand the research work at work. Moreover, human-robot interaction is a must
as per the demand of the market (Mumm & Mutlu, 211). In the present generation, robotics is a new
trend in various industries. Therefore, it is necessary to improve the basic needs of a function.
Moreover, automation processes have used for managing various things (Majidi, 2014). Moreover,
research can be modified for robotics and human interaction based on the need of human beings and
the industry (Watanabe, 2011). It will be more beneficial for human beings and industries. However,
it can be changed based on feedback about the various approaches in the field of human-robotic
interaction. In addition, human-robot interaction will be used in various areas, such as education,
healthcare, security, retails, tourism, and many more. Robots are the creation of AI and machine
learning, which can be managed using various processes.
General relevance:
Human-robot interaction is beneficial for the future generation, as it will reduce the efforts of humans
for many works, which are suitable for humans. In addition, robotics has used to manage all the things
in a better way. Moreover, emerging technologies have used robotics for various purposes, such as
development, designing, manufacturing, and many more.
Human-robot interaction
Presented by (the lecturer’s name)
Research area:
Many organizations have used robotics for managing their work, which has improved the productivity
and performance of the organization. Thus, it is a basic need for automation to create interaction
between robots and human, which will be provided with better outcomes. In addition, there are many
things to improve in the field of automation and robotics including human interaction. There are many
approaches to artificial intelligence (AI), which can be used for managing various things. AI can be
used to improve human-robot interaction, which is better for improvement (Argall & Billard, 2010).
Human is sensitive to some works. Thus, robots can be used to manage many works, which are
dangerous for humans, such as critical works in mining industries.
Relation to Computer Science in general: it is related to machine learning and AI, which is highly
used for managing various things. It can relate to emerging technologies, which are the basic needs of
the system. Robotics is a part of Computer science, as it has created based on algorithms and different
techniques (Mavridis, 2015).
Research questions and methods:
Robotics is a huge field for research work, but it should be in ethical considerations. There are some
issues related to system design and manufacturing, which make a huge impact on design as well.
Research organizations should work in a limit, which is harmless devices and equipment. In addition,
there are some basic ideas behind the research work in the field of human-robot interaction. Robotics
can be impacted the human as well, thus, it should be managed properly (Sheridan, 2016). There are
many surveys to understand the research work at work. Moreover, human-robot interaction is a must
as per the demand of the market (Mumm & Mutlu, 211). In the present generation, robotics is a new
trend in various industries. Therefore, it is necessary to improve the basic needs of a function.
Moreover, automation processes have used for managing various things (Majidi, 2014). Moreover,
research can be modified for robotics and human interaction based on the need of human beings and
the industry (Watanabe, 2011). It will be more beneficial for human beings and industries. However,
it can be changed based on feedback about the various approaches in the field of human-robotic
interaction. In addition, human-robot interaction will be used in various areas, such as education,
healthcare, security, retails, tourism, and many more. Robots are the creation of AI and machine
learning, which can be managed using various processes.
General relevance:
Human-robot interaction is beneficial for the future generation, as it will reduce the efforts of humans
for many works, which are suitable for humans. In addition, robotics has used to manage all the things
in a better way. Moreover, emerging technologies have used robotics for various purposes, such as
development, designing, manufacturing, and many more.
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 3
Generally, robotics is a common need of most of the areas. Thus, it should be better to manage
various processes. There are some negative impacts of human-robot interaction, which is not good for
the future generations, such as bugs, hacking, cybercrime, and many more. Human-robot interaction is
helpful in the development of new systems, which are beneficial for companies and customers. There
are various fields, where robots have used, which are dangerous processes. Thus, it can be better to
modify the automation process using human-robot interaction. Research must include negative
impacts of human-robot interaction, which can be dangerous for human beings. There are many
factors in the research, which must base on the rule and regulations and ethics. Research must follow
the public interest, as it can be used for the benefits of humans as well.
Generally, robotics is a common need of most of the areas. Thus, it should be better to manage
various processes. There are some negative impacts of human-robot interaction, which is not good for
the future generations, such as bugs, hacking, cybercrime, and many more. Human-robot interaction is
helpful in the development of new systems, which are beneficial for companies and customers. There
are various fields, where robots have used, which are dangerous processes. Thus, it can be better to
modify the automation process using human-robot interaction. Research must include negative
impacts of human-robot interaction, which can be dangerous for human beings. There are many
factors in the research, which must base on the rule and regulations and ethics. Research must follow
the public interest, as it can be used for the benefits of humans as well.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 4
Cloud computing
Presented by (the lecturer’s name)
Research area: Cloud Computing (CC) is the best field for research work, as it has resolved various
issues for many areas, such as data storage, virtualization, and many more. In addition, CC has faced
issues and challenges in privacy and security (Chen & Zhao, 2012). There are many issues with the
development and implementation of CC in a firm. Moreover, CC can be used for various areas, such
as healthcare, education, retails, and many more. Thus, it is necessary to develop a high level of
security and privacy, especially for the banking sector. In addition, the cloud can be used for private
and public services for managing various things (Jansen, 2011). This work can improve the security of
CC, which is necessary for most of the clients. In addition, there are various methods to improve the
level of security and privacy in the CC. it will be helpful in the various fields, such as healthcare,
education, tourism, engineering, and many others.
Relation to Computer Science in general: CC is a part of computer science, as it is a platform for
providing various services to clients, such as data storage, network management, virtualization, and
many others. It can be used for managing different architectures (Prokopp, 2014).
Research questions and methods: Additionally, research can be based on the security of data in the
cloud, which can be based on network security, data security, and many others. Thus, it is can be
including various things to develop a new architecture for managing various things (Kshetri, 2013).
Moreover, there is some risk associated with cloud architecture, which can be a base of research to
improve architecture as well (Mather, et al., 2009). Security of data first needs of a system, as
confidential information is necessary for the customers in the market (Pearson, 2013). In addition,
the modern organization has used ERP systems for managing various issues in their business. Thus, it
is necessary to improve the basic needs of the area, which can be beneficial for the user as well (Peng
& Gala, 2014). Besides, CC has used a complex system for managing basic processes, such as
development, implementation and more (Publishing, 2018). However, there are many security
architectures, which can be used for managing various services (Rittinghouse & Ransome, 2016).
There is logic behind the CC, which makes it better for technological solutions. There are some basic
needs to advance research to optimized services.
General relevance: CC is a part of most of the large-scale firms, which has adopted various methods,
which are beneficial for them. Research can be used to resolve current issues of those areas, which has
suffered from security and privacy issues. There is some negative impact of CC, as it has connected
with the public network as well, which can be hacked. Thus, it is necessary to make changes to secure
the whole architecture (Romansky, 2012).
Cloud computing
Presented by (the lecturer’s name)
Research area: Cloud Computing (CC) is the best field for research work, as it has resolved various
issues for many areas, such as data storage, virtualization, and many more. In addition, CC has faced
issues and challenges in privacy and security (Chen & Zhao, 2012). There are many issues with the
development and implementation of CC in a firm. Moreover, CC can be used for various areas, such
as healthcare, education, retails, and many more. Thus, it is necessary to develop a high level of
security and privacy, especially for the banking sector. In addition, the cloud can be used for private
and public services for managing various things (Jansen, 2011). This work can improve the security of
CC, which is necessary for most of the clients. In addition, there are various methods to improve the
level of security and privacy in the CC. it will be helpful in the various fields, such as healthcare,
education, tourism, engineering, and many others.
Relation to Computer Science in general: CC is a part of computer science, as it is a platform for
providing various services to clients, such as data storage, network management, virtualization, and
many others. It can be used for managing different architectures (Prokopp, 2014).
Research questions and methods: Additionally, research can be based on the security of data in the
cloud, which can be based on network security, data security, and many others. Thus, it is can be
including various things to develop a new architecture for managing various things (Kshetri, 2013).
Moreover, there is some risk associated with cloud architecture, which can be a base of research to
improve architecture as well (Mather, et al., 2009). Security of data first needs of a system, as
confidential information is necessary for the customers in the market (Pearson, 2013). In addition,
the modern organization has used ERP systems for managing various issues in their business. Thus, it
is necessary to improve the basic needs of the area, which can be beneficial for the user as well (Peng
& Gala, 2014). Besides, CC has used a complex system for managing basic processes, such as
development, implementation and more (Publishing, 2018). However, there are many security
architectures, which can be used for managing various services (Rittinghouse & Ransome, 2016).
There is logic behind the CC, which makes it better for technological solutions. There are some basic
needs to advance research to optimized services.
General relevance: CC is a part of most of the large-scale firms, which has adopted various methods,
which are beneficial for them. Research can be used to resolve current issues of those areas, which has
suffered from security and privacy issues. There is some negative impact of CC, as it has connected
with the public network as well, which can be hacked. Thus, it is necessary to make changes to secure
the whole architecture (Romansky, 2012).
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 5
Cloud computing is a good technology in front of various industries to develop their business, as it
can be used for managing various things. Moreover, people can use advance services to their
businesses and other works. Research can be based on the areas. Cloud computing can be used for
managing research work as well. There are some internal techniques, which can improve the security
of the CC. thus, it is necessary to improve the security of the CC to manage other works in an efficient
manner. Backup and recovery are necessary for a firm to secure their data using CC. therefore, it is
necessary to improve the basic things in CC, which will provide positive feedbacks from various
industries (Jansen, 2011).
Cloud computing is a good technology in front of various industries to develop their business, as it
can be used for managing various things. Moreover, people can use advance services to their
businesses and other works. Research can be based on the areas. Cloud computing can be used for
managing research work as well. There are some internal techniques, which can improve the security
of the CC. thus, it is necessary to improve the security of the CC to manage other works in an efficient
manner. Backup and recovery are necessary for a firm to secure their data using CC. therefore, it is
necessary to improve the basic things in CC, which will provide positive feedbacks from various
industries (Jansen, 2011).
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 6
Big data mining social data mining
Presented by (the lecturer’s name)
Research area: data mining is a good approach for data analytics and other things, which are
beneficial for various things. Most of the mining techniques have used in the field of social data
mining. Social media networking sites have a large amount of data, which is useful for prediction and
decision for a task (White, et al., 2017). Moreover, text mining is helpful in the social network's
mining. In addition, there are many features of social media networking sites, which is good for users
and firms as well. There are many good topics to manage research work. There are some basic needs
to analyse data sets and items of the database (Bifet, 2013). Moreover, research can be based on the
business model of social media networking sites.
Relation to Computer Science in general: Mining is an advance part of the database system, which
is a part of computer science. Data mining is based on Big Data (BD), which is a useful technique for
data management. The data warehouse is related to the computer science field (Taylor, 2018). Social
data mining is helping in the business models as well.
Research questions and methods: Role of data mining and big data in social data mining is a
different type of research, which will provide better solutions to various problems. Can data mining
will help in social mining, as it is an area to research (Smolan, 2013). Moreover, research can be used
to analyse surveys and feedbacks of experts to design various techniques, which is good for the
company. Big data is a base of data management, which has used for managing a large amount of data
(Al-Jarrah, et al., 2015). Social mining is a new trend in social media, which is useful for business as
well. Social mining can be used for identifying the behaviour of users, which is a good thing for
business (Bou-Harb, et al., 2016). Social media is a way for collaborating employees and firm.
Besides, it is a new trend to manage conflicts between people as well (Manovich, 2011). Social
mining can be helpful in the betterment of the business model and behavioural modelling. In addition,
there are many advantages of social mining, which is better for managing basic things on social media
sites. It can be managed using basic things.
General relevance: there are many good impacts of such types of research. In addition, there are
many benefits to social mining. Most of the things have used for arranging a large amount of data
analytics and mining. In addition, data security has required to manage confidential data of a firm.
There is some negative impact of social media on the behavior learning of users. It is connecting with
the present and future generations. However, the mining process has required structured data for
mining. Thus, it can be useful for various field as well. Social media is common in the present
generation, as most of the people have used smartphones for various purposes. Therefore, it is highly
required to apply text mining and other mining approaches for better results in the business.
Big data mining social data mining
Presented by (the lecturer’s name)
Research area: data mining is a good approach for data analytics and other things, which are
beneficial for various things. Most of the mining techniques have used in the field of social data
mining. Social media networking sites have a large amount of data, which is useful for prediction and
decision for a task (White, et al., 2017). Moreover, text mining is helpful in the social network's
mining. In addition, there are many features of social media networking sites, which is good for users
and firms as well. There are many good topics to manage research work. There are some basic needs
to analyse data sets and items of the database (Bifet, 2013). Moreover, research can be based on the
business model of social media networking sites.
Relation to Computer Science in general: Mining is an advance part of the database system, which
is a part of computer science. Data mining is based on Big Data (BD), which is a useful technique for
data management. The data warehouse is related to the computer science field (Taylor, 2018). Social
data mining is helping in the business models as well.
Research questions and methods: Role of data mining and big data in social data mining is a
different type of research, which will provide better solutions to various problems. Can data mining
will help in social mining, as it is an area to research (Smolan, 2013). Moreover, research can be used
to analyse surveys and feedbacks of experts to design various techniques, which is good for the
company. Big data is a base of data management, which has used for managing a large amount of data
(Al-Jarrah, et al., 2015). Social mining is a new trend in social media, which is useful for business as
well. Social mining can be used for identifying the behaviour of users, which is a good thing for
business (Bou-Harb, et al., 2016). Social media is a way for collaborating employees and firm.
Besides, it is a new trend to manage conflicts between people as well (Manovich, 2011). Social
mining can be helpful in the betterment of the business model and behavioural modelling. In addition,
there are many advantages of social mining, which is better for managing basic things on social media
sites. It can be managed using basic things.
General relevance: there are many good impacts of such types of research. In addition, there are
many benefits to social mining. Most of the things have used for arranging a large amount of data
analytics and mining. In addition, data security has required to manage confidential data of a firm.
There is some negative impact of social media on the behavior learning of users. It is connecting with
the present and future generations. However, the mining process has required structured data for
mining. Thus, it can be useful for various field as well. Social media is common in the present
generation, as most of the people have used smartphones for various purposes. Therefore, it is highly
required to apply text mining and other mining approaches for better results in the business.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 7
Big data analytics
Presented by (the lecturer’s name)
Research area: there are many benefits of big data analytics, which can be used for managing various
things in a firm. It is a common issue in a firm to manage a data in a proper structure for reporting and
analysis process. Most of the firms have used their personal databases. However, a large-scale
organization can afford only data centres, as they are costly. There is a scope of research to provide
better data analytics using big data and data mining technology with minimum cost and time (Verma,
2018).
Relation to Computer Science in general: Big data is a part of computer science, as well as data
analytics, is a part of this area. Thus, it is necessary to develop an advanced system to use different
technologies for solving a common issue of various firms for their business (Gupta, et al., 2018).
Research questions and methods: Mostly research has used to innovate new things. However, it can
be used for solving an issue using different techniques, such as big data and data analytics. In
addition, Business Intelligence (BI) is a new trend in the industry to manage all the changes (Chen, et
al., 2012). Big data plays a huge role in data analytics, which has faced critical issues to manage a
large amount of data (Chowdhury, 2014). BD can be a useful tool for managing various things in a
firm, such as marketing, sales and many others (Gupta, et al., 2018). There is a huge benefit of
connecting various technologies for managing various things, such as big data, cloud computing, and
many more. (Verma, 2018). Big data analytics will provide better results for decision making, which
is necessary for business processes. Additionally, big data analytics can be used for managing the
services of a firm, which can be optimized using different techniques. A protocol model can be used
for solving such types of issues. Thus, it will be better for current and future generations (Taylor,
2018). There are some specific parts of a system, which can be modified using various things, such as
CC and big data. There are some basic things to improve the efficiency of the system as well. Many
things can be analysed using basic service as well. Most of the things can be optimized using research
methods. Thus, it is necessary to improve the research work based on the various agile techniques. It
will provide better results in the field of computer science. Big data is improving based on research
and analysis based on the issues and challenges in the industries (Smolan, 2013).
General relevance: role of big data analytics is huge according to the success rate of various firms.
Thus, it is necessary to research such types of techniques, which has reduced cost and time from
various business functions. In addition, there is some negative impact of big data analytics, as small
businesses have not required such types of facilities. Positive impacts can affect various areas as well.
There is some limit to the research work because of resources.
Big data analytics
Presented by (the lecturer’s name)
Research area: there are many benefits of big data analytics, which can be used for managing various
things in a firm. It is a common issue in a firm to manage a data in a proper structure for reporting and
analysis process. Most of the firms have used their personal databases. However, a large-scale
organization can afford only data centres, as they are costly. There is a scope of research to provide
better data analytics using big data and data mining technology with minimum cost and time (Verma,
2018).
Relation to Computer Science in general: Big data is a part of computer science, as well as data
analytics, is a part of this area. Thus, it is necessary to develop an advanced system to use different
technologies for solving a common issue of various firms for their business (Gupta, et al., 2018).
Research questions and methods: Mostly research has used to innovate new things. However, it can
be used for solving an issue using different techniques, such as big data and data analytics. In
addition, Business Intelligence (BI) is a new trend in the industry to manage all the changes (Chen, et
al., 2012). Big data plays a huge role in data analytics, which has faced critical issues to manage a
large amount of data (Chowdhury, 2014). BD can be a useful tool for managing various things in a
firm, such as marketing, sales and many others (Gupta, et al., 2018). There is a huge benefit of
connecting various technologies for managing various things, such as big data, cloud computing, and
many more. (Verma, 2018). Big data analytics will provide better results for decision making, which
is necessary for business processes. Additionally, big data analytics can be used for managing the
services of a firm, which can be optimized using different techniques. A protocol model can be used
for solving such types of issues. Thus, it will be better for current and future generations (Taylor,
2018). There are some specific parts of a system, which can be modified using various things, such as
CC and big data. There are some basic things to improve the efficiency of the system as well. Many
things can be analysed using basic service as well. Most of the things can be optimized using research
methods. Thus, it is necessary to improve the research work based on the various agile techniques. It
will provide better results in the field of computer science. Big data is improving based on research
and analysis based on the issues and challenges in the industries (Smolan, 2013).
General relevance: role of big data analytics is huge according to the success rate of various firms.
Thus, it is necessary to research such types of techniques, which has reduced cost and time from
various business functions. In addition, there is some negative impact of big data analytics, as small
businesses have not required such types of facilities. Positive impacts can affect various areas as well.
There is some limit to the research work because of resources.
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 8
In addition, improvement is necessary for the field of big data analytics, which will help in various
areas, such as healthcare, retail, education, security, and many more. Big data analytics can be
modified using advance research on machine learning and deep learning, which will provide better
functions to manage various things. Most of the programs have used for the management of various
things in a firm. It can be related with the various industries, such as retail, education, healthcare, and
many more. This is a good topic for research, as most of the medium and large-scale organizations
have used bid data analytics.
In addition, improvement is necessary for the field of big data analytics, which will help in various
areas, such as healthcare, retail, education, security, and many more. Big data analytics can be
modified using advance research on machine learning and deep learning, which will provide better
functions to manage various things. Most of the programs have used for the management of various
things in a firm. It can be related with the various industries, such as retail, education, healthcare, and
many more. This is a good topic for research, as most of the medium and large-scale organizations
have used bid data analytics.
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 9
References
Al-Jarrah, O. Y. et al., 2015. Efficient machine learning for big data: A review. Big Data Research,
2(3), pp. 87-93.
Argall, B. D. & Billard, A. G., 2010. A survey of tactile human–robot interactions. Robotics and
autonomous systems, 58(10), pp. 1159-1176.
Bifet, A., 2013. Mining big data in real time. Informatica, 37(1).
Bou-Harb, E., Debbabi, M. & Assi, C., 2016. Big data behavioral analytics meet graph theory: on
effective botnet takedowns. IEEE Network, 31(1), pp. 18-26.
Chen, D. & Zhao, H., 2012. Data security and privacy protection issues in cloud computing.
International Conference on Computer Science and Electronics Engineering, 1(1), pp. 647-651.
Chen, H., Chiang, R. H. & Storey, V. C., 2012. Business intelligence and analytics: from big data to
big impact. MIS quarterly, pp. 1165-1188.
Chowdhury, S., 2014. Big data and data warehouse augmentation. [Online]
Available at: https://www.ibm.com/developerworks/library/ba-augment-data-warehouse1/index.html
Gupta, . A. et al., 2018. Big data & analytics for societal impact: Recent research and trends. 20(2),
185-194.. Information Systems Frontiers, 20(2), pp. 185-194.
Jansen, W. A., 2011. Cloud hooks: Security and privacy issues in cloud computing.. Hawaii, IEEE,
pp. 1-10.
Kshetri, . N., 2013. Privacy and security issues in cloud computing: The role of institutions and
institutional evolution. Telecommunications Policy, 37(4-5), pp. 372-386.
Majidi, C., 2014. Soft robotics: a perspective—current trends and prospects for the future. Soft
Robotics, 1(1), pp. 5-11.
Manovich, L., 2011. Trending: The promises and the challenges of big social data. Debates in the
digital humanities, Volume 2, pp. 460-475.
Mather, T., Kumaraswamy, S. & Latif, S., 2009. Cloud security and privacy: an enterprise
perspective on risks and compliance.. Sebastopol: O'Reilly Media, Inc..
Mavridis, N., 2015. A review of verbal and non-verbal human–robot interactive communication.
Robotics and Autonomous Systems, 63(1), pp. 22-35.
References
Al-Jarrah, O. Y. et al., 2015. Efficient machine learning for big data: A review. Big Data Research,
2(3), pp. 87-93.
Argall, B. D. & Billard, A. G., 2010. A survey of tactile human–robot interactions. Robotics and
autonomous systems, 58(10), pp. 1159-1176.
Bifet, A., 2013. Mining big data in real time. Informatica, 37(1).
Bou-Harb, E., Debbabi, M. & Assi, C., 2016. Big data behavioral analytics meet graph theory: on
effective botnet takedowns. IEEE Network, 31(1), pp. 18-26.
Chen, D. & Zhao, H., 2012. Data security and privacy protection issues in cloud computing.
International Conference on Computer Science and Electronics Engineering, 1(1), pp. 647-651.
Chen, H., Chiang, R. H. & Storey, V. C., 2012. Business intelligence and analytics: from big data to
big impact. MIS quarterly, pp. 1165-1188.
Chowdhury, S., 2014. Big data and data warehouse augmentation. [Online]
Available at: https://www.ibm.com/developerworks/library/ba-augment-data-warehouse1/index.html
Gupta, . A. et al., 2018. Big data & analytics for societal impact: Recent research and trends. 20(2),
185-194.. Information Systems Frontiers, 20(2), pp. 185-194.
Jansen, W. A., 2011. Cloud hooks: Security and privacy issues in cloud computing.. Hawaii, IEEE,
pp. 1-10.
Kshetri, . N., 2013. Privacy and security issues in cloud computing: The role of institutions and
institutional evolution. Telecommunications Policy, 37(4-5), pp. 372-386.
Majidi, C., 2014. Soft robotics: a perspective—current trends and prospects for the future. Soft
Robotics, 1(1), pp. 5-11.
Manovich, L., 2011. Trending: The promises and the challenges of big social data. Debates in the
digital humanities, Volume 2, pp. 460-475.
Mather, T., Kumaraswamy, S. & Latif, S., 2009. Cloud security and privacy: an enterprise
perspective on risks and compliance.. Sebastopol: O'Reilly Media, Inc..
Mavridis, N., 2015. A review of verbal and non-verbal human–robot interactive communication.
Robotics and Autonomous Systems, 63(1), pp. 22-35.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 10
Mumm, . J. & Mutlu, B., 211. Human-robot proxemics: physical and psychological distancing in
human-robot interaction.. s.l., ACM, pp. 331-338.
Pearson, . S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud
Computing. 1 ed. London: Springer.
Peng, G. C. A. & Gala, C., 2014. Cloud ERP: a new dilemma to modern organisations?. Journal of
Computer Information Systems, 54(4), pp. 22-30.
Prokopp, C., 2014. Big Data Science and Cloud Computing. [Online]
Available at: https://www.semantikoz.com/blog/big-data-as-a-service-definition-classification/
[Accessed 25 October 2019].
Publishing, P., 2018. Complex Cloud Architecture Types. [Online]
Available at: https://www.networkcomputing.com/cloud-infrastructure/complex-cloud-architecture-
types
Rittinghouse, J. W. & Ransome, J. F., 2016. Cloud computing: implementation, management, and
security. Florida: CRC press.
Romansky, R., 2012. Cloud Services: Challenges for Personal Data Protection. International Journal
on Information Technologies and Security, pp. 67-80.
Sheridan, T. B., 2016. Human–robot interaction: status and challenges. Human factors, 58(4), pp.
525-532.
Smolan, R., 2013. The human face of big data. s.l.:s.n.
Taylor, P. L., 2018. Big Data Mining Previews 2019's Hottest Vacation Trends And The Future Of
Online Travel. [Online]
Available at: https://www.forbes.com/sites/petertaylor/2018/12/02/big-data-mining-previews-2019s-
hottest-vacation-trends-and-the-future-of-online-travel/#285a5f6d4d26
[Accessed 11 December 2018].
Verma, A., 2018. The Relationship between IoT, Big Data, and Cloud Computing. [Online]
Available at: https://www.whizlabs.com/blog/relationship-between-iot-big-data-cloud-computing/
Watanabe, T., 2011. Human-entrained embodied interaction and communication technology. 1st ed.
London: Springer.
White, G., Ariyachandra, T. & White, D., 2017. Big Data, Ethics, and Social Impact Theory-A
Conceptual Framework. Journal of Management & Engineering Integration, 10(1), pp. 22-28.
Mumm, . J. & Mutlu, B., 211. Human-robot proxemics: physical and psychological distancing in
human-robot interaction.. s.l., ACM, pp. 331-338.
Pearson, . S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud
Computing. 1 ed. London: Springer.
Peng, G. C. A. & Gala, C., 2014. Cloud ERP: a new dilemma to modern organisations?. Journal of
Computer Information Systems, 54(4), pp. 22-30.
Prokopp, C., 2014. Big Data Science and Cloud Computing. [Online]
Available at: https://www.semantikoz.com/blog/big-data-as-a-service-definition-classification/
[Accessed 25 October 2019].
Publishing, P., 2018. Complex Cloud Architecture Types. [Online]
Available at: https://www.networkcomputing.com/cloud-infrastructure/complex-cloud-architecture-
types
Rittinghouse, J. W. & Ransome, J. F., 2016. Cloud computing: implementation, management, and
security. Florida: CRC press.
Romansky, R., 2012. Cloud Services: Challenges for Personal Data Protection. International Journal
on Information Technologies and Security, pp. 67-80.
Sheridan, T. B., 2016. Human–robot interaction: status and challenges. Human factors, 58(4), pp.
525-532.
Smolan, R., 2013. The human face of big data. s.l.:s.n.
Taylor, P. L., 2018. Big Data Mining Previews 2019's Hottest Vacation Trends And The Future Of
Online Travel. [Online]
Available at: https://www.forbes.com/sites/petertaylor/2018/12/02/big-data-mining-previews-2019s-
hottest-vacation-trends-and-the-future-of-online-travel/#285a5f6d4d26
[Accessed 11 December 2018].
Verma, A., 2018. The Relationship between IoT, Big Data, and Cloud Computing. [Online]
Available at: https://www.whizlabs.com/blog/relationship-between-iot-big-data-cloud-computing/
Watanabe, T., 2011. Human-entrained embodied interaction and communication technology. 1st ed.
London: Springer.
White, G., Ariyachandra, T. & White, D., 2017. Big Data, Ethics, and Social Impact Theory-A
Conceptual Framework. Journal of Management & Engineering Integration, 10(1), pp. 22-28.
ADVANCED RESEARCH TOPICS IN COMPUTER SCIENCE 11
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.