My contemplations and diurnal novelties are publicized here

Research Paper Topics


Research Paper Topics & Ideas

Welcome to Journal of Theoretical and Applied Information Technology. In this listing, we intend to describe research methodologies to help write a quality research article and assist in finding a research topic.

As we all know that "Research" is the process of collecting information and data about a topic being studied. It  is a systematic process of inquiry in order to discover, interpret or revise facts, events, behaviors, or theories, or to make practical applications with the help of such facts. It is a continues process and doest not mean that it always is successful. In the past, one has bear witness to some heavily funded projects going down the drain and achieving so less after so much promise.

Choosing  an interesting and worthy research topic is always a time consuming process for a research group. Choosing  a topic, searching relevant material and citing sources is always challenging and sometimes painful. We cannot neglect the importance of search engines in this regard. Search Engines like Google and MSN will always be your true friends. Also we advise you to

1.            Read current newspapers and magazines related to information technology.

2.            Just going blindly for a research topic without proper homework means nothing but wastage of time. So post your queries about your intended research field in technology related Forums and Webs. Also search for your topic in websites like "Research Topics" , Ideas for Term Papers, and Reports.

3.            Always choose a topic that can be treated persuasively, is related to your domain of expertise, you have enough knowledge and resource for this  and can be developed adequately within the timeframe.

4.            If you are using some one else’s idea, always refer it. Plagiarism does not mean that you cannot quote or pass one’s words. It is actually a careless or intentional effort to take credit of  someone’s work.

Research Areas

•             Algorithms

•             Artificial Intelligence

•             Bio-Computation

•             Database & Information Systems

•             Distributed Systems/Ubiquitous Computing

•             Geometric Computation

•             Graphics

•             Hardware/Architecture

•             Human Computer Interaction

•             Internet Systems & Infrastructure

•             Knowledge Representation & Reasoning

•             Machine Learning

•             Math Theory of Computation

•             Natural Language & Speech

•             Networks

•             Probabilistic Methods & Game Theoretic Methods

•             Programming Languages & Compilers

•             Robotics, Vision & Physical Modeling

•             Scientific Computing

•             Security and Privacy

•             Software/Operating Systems

•             Systems Reliability/Dependability

Possible Research Topics and Areas

 

Following is a set of hot topics in the field of Theoretical and Applied Information Technology on which active research is being conducted by Institutes and Research Organizations across the Globe. Since they are on the public domain, everyone is free to take advantage of them but one should be careful that they do not collide in their research aims and names in the near future so it is recommended that you should chose the topic after careful consideration and modify your research aims accordingly. 

•             Security and Cryptography on WWW

•             Managing & analyzing large volumes of dynamic & diverse data

•             Privacy and Databases

•             A System for Integrated Management of Data, Accuracy, and Lineage

•             Agile Engineering Methods for Distributed Dependable Systems

•             Modeling Complex Systems

•             Design Patterns for Distributed Dependable Control Systems

•             Agent Oriented Software Engineering

•             Design and Analysis Methods for Multi-Agent Systems

•             Software Engineering Methods and Tools for Soft Computing

•             E-commerce challenges and solutions

•             Automated E-commerce negotiation agents

•             Database management system for XML

•             Tradeoffs in Replication Precision and Performance

•             Trusted Image Dissemination

•             Integrating database queries & Web searches

•             Compiling High-level Access Interfaces for Multi-site Software

•             Content-based Image Retrieval

•             Digital Library Technologies

•             Parallel Query Optimization

•             Large-scale Interoperation and Composition

•             Scalable Knowledge Composition

•             Privacy and Databases

•             High Performance Knowledge Bases

•             Computational Game Theory

•             Multi-Agent Learning

•             Digital Circuit Optimization

•             Transactional Coherence and Consistency

•             Visualizing Large VLSI Datasets

•             Global Optimization and Self-Calibration of CMOS Analog Circuits

•             Computational Law

•             General Game Playing

•             Logical Spreadsheets

•             Collaborative Commerce

•             Global Trading Catalog

•             Exploration of indigenous language dictionaries

•             Textual Inferences

•             Shallow Semantic Parsing

•             Unsupervised Language Learning

•             Question Answering with Statistics and Inference

•             Clustering Models

•             Statistical Machine Translation

•             Design of Ad-hoc Wireless Networks for Real-Time Media

•             Compression and Streaming

•             Optimized Video Streaming

•             Image and Signal Processor

•             Scalable Network Fabrics

•             High Speed Signaling

•             System-Level Design Tools and Hardware/Software Co-design

•             Web Password Hashing

•             Preventing online identity theft and phasing

•             Software Quality and Infrastructure Protection for Diffuse Computing

•             Agile Management of Dynamic Collaboration

•             Computational modeling of signal transduction pathways

•             Robotics

•             Artificial Intelligence

•             Validity Check

•             Electronic Voting

•             Verification of high-level designs

•             Statistics and Data Mining

•             Computer Ethics

•             Privacy, Right of Freedom Of Information

•             Standardizing E-Commerce Protocols

•             Software Metrics and Models

•             Software Configuration Management Patterns

•             Approximation Algorithms

•             Design of Network Topology

•             Software Development Technologies For Reactive, Real-Time, and Hybrid Systems

•             Modeling Flexible Protein Loops

•             Study of Protein Motion

•             Sensing of Deformable Objects

•             Adaptive Dynamic Collision Checking

•             Climbing Robots

•             Deformable Object Simulation

•             Robots on Rough Terrain

•             Textual Inferences

•             Machine Learning Control

•             Enterprise Software, Solutions, and Services

•             E-commerce and the World Wide Web

•             Future of Web Services

•             Electronic surveillance

•             Software Model for Game Programming

•             Extreme Programming

•             Agile Software Development

•             Reliable Component-Based Software Systems

•             Engineering and Technology Management

•             Application of Virtual Reality

•             Digital Convergence

•             Applications of Data warehousing and data mining

•             IP Telephony

•             Genetic Engineering

•             Security threats through Spy ware

•             Software Architecture Patterns

•             Object Oriented Design Patterns and Frameworks

•             Grid Computing

•             FPGA

•             Voice Technology

•             Controlling Pornography and Computer Crime over Internet

•             Internet and the Economic Revolution

•             Ad-Hoc Networks Modeling

•             Globalization and Computers

•             Computer Aided Design

•             Bioinformatics and Biometrix

•             Computer Technology and Government

•             Computer Crimes Cyberspace Social Aspects

•             Human Computer Interaction

•             Robust IP security

•             Mechanisms for Friendly Robotics

•             Multi-directional Motion Planning

•             Manipulation Planning

•             Surgical Simulation

•             Next-Generation Grids and Distributed Systems

•             Peer to Peer Computing

•             Distributed Data Management

•             Design and Manufacturing

•             Repositories of Reusable Knowledge

•             Randomized Motion Planning

•             Technology-Assisted Surgery

•             Human Motion Simulation

•             Human-Centered Machine Design

•             Simulation & Active Interfaces

•             Graphics System and Architecture

•             Interactive Workspaces

•             Computational Photography

•             Multi-graphics

•             Real-Time Programmable Shading

•             Rendering Algorithms

•             Simulation & Analysis of Muscle Models

•             Virtual Human Simulation

•             Compression of synthetic images

•             Creating digital archives of 3D artworks

•             3D fax machine

•             Responsive Workbench

•             Spreadsheets for Images

•             Texture Analysis and Synthesis

•             Visualizing Complex Systems

•             Volume Rendering

•             Predicate Abstraction

•             Verification of transaction-based protocols

•             Reconfigurable Wireless Networks for Multimode Communications

•             Smart Photonic Networks

•             Improving Program Robustness via Static Analysis and Dynamic Instrumentation

•             High-Level Area and Timing Estimation

•             Hardware-Software Co-Synthesis

•             Collaborative Co-Located Information Organization

•             Enabling Rapid Off-the-Desktop Prototyping

•             Notebooks that Share and Walls that Remember

•             Interactive Workspaces

•             HAL

•             Logic Programming Techniques

•             Data Compression and Coding

•             Human Language Technology

•             Information Discovery

•             Machine Learning and Data Mining

•             Security and Cryptography

•             Spatial Data

•             XML and Semi-Structured Data

•             Supporting co-located, collaborative work with computationally-enhanced tables.

•             A collaborative work environment

•             Beyond the Desktop

•             Interaction with Large Displays

•             Moving Information and Control

•             Defense against Distributed Denial of Service Attacks

•             Extreme Scale Cluster Architecture

•             Feedback Based Inter-domain Routing

•             History-based Anti-spam

•             Towards Self-Managed Wireless LANs

•             Interactive Workspaces

•             Recovery Oriented Computing

•             A collaborative work environment

•             Only Software & Recursive Micro-reboots

•             Decoupled Storage

•             Space Systems

•             Inference Web

•             Web Semantics Technologies

•             AI-bots

•             Repositories of Reusable Knowledge

•             An Object-Oriented Modular Reasoning System

•             Model-Based Support of Distributed Collaborative Design

•             Modeling, Analysis and Control of Hybrid Systems

•             Technology for Enhanced Reuse of Design Objects

•             Virtual Network System

•             Active Queue Management

•             Scaleable Performance Prediction and Efficient Network Simulation

•             Sensor Networks

•             TCP Performance

•             Energy Efficient Wireless Communication

•             Load Balancing

•             Multimedia over Networks

•             Stochastic Network Theory

•             Web Cache Performance and Analysis

•             Optical Router

•             Optimal Routing in the Internet

•             Parallel Packet Switch

•             Rate Control Protocol for Short-lived Flows

•             Single Buffered Routers

•             TCP Switching

•             High Performance Switching

•             Link Adaptation in Wireless Local Area Networks

•             Mobility in Cellular and Wireless Local Area Networks

•             Performance Assessment and Traffic Differentiation in Wireless Local Area Networks

•             Identity Based Encryption

•             Authenticating Streamed Data

•             Identity Based Encryption Email system

•             Intrusion tolerance via threshold cryptography

•             Security of cryptographic primitives and protocols

•             Remote Exploration and Experimentation

•             Reliability Obtained by Adaptive Reconfiguration

•             Agent Applications and Ontologies

•             Agent-Oriented Software Engineering

•             Agent Programming and Specification Languages

•             Concept-Based Retrieval and Interpretation for Large Datasets

•             Complex and Adaptive Systems

•             Constraint Programming

•             Declarative Debugging

•             Web application Security

 

 

Leave a comment