Thursday, 12 January 2012

Research Paper Topics & Ideas

Research Paper Topics & Ideas

Welcome to Journal of Theoretical and Applied Information Technology. In this listing, we intend to describe research methodologies to help write a quality research article and assist in finding a research topic.
As we all know that "Research" is the process of collecting information and data about a topic being studied. It  is a systematic process of inquiry in order to discover, interpret or revise facts, events, behaviors, or theories, or to make practical applications with the help of such facts. It is a continues process and doest not mean that it always is successful. In the past, one has bear witness to some heavily funded projects going down the drain and achieving so less after so much promise.
Choosing  an interesting and worthy research topic is always a time consuming process for a research group. Choosing  a topic, searching relevant material and citing sources is always challenging and sometimes painful. We cannot neglect the importance of search engines in this regard. Search Engines like Google and MSN will always be your true friends. Also we advise you to
  1. Read current newspapers and magazines related to information technology.
  2. Just going blindly for a research topic without proper homework means nothing but wastage of time. So post your queries about your intended research field in technology related Forums and Webs. Also search for your topic in websites like "Research Topics" , Ideas for Term Papers, and Reports.
  3. Always choose a topic that can be treated persuasively, is related to your domain of expertise, you have enough knowledge and resource for this  and can be developed adequately within the timeframe.
  4. If you are using some one else's idea, always refer it. Plagiarism does not mean that you cannot quote or pass one's words. It is actually a careless or intentional effort to take credit of  someone's work.

Research Areas

  • Algorithms
  • Artificial Intelligence
  •  Bio-Computation
  • Database & Information Systems
  •  Distributed Systems/Ubiquitous Computing
  • Geometric Computation
  • Graphics
  • Hardware/Architecture
  • Human Computer Interaction
  • Internet Systems & Infrastructure
  • Knowledge Representation & Reasoning
  • Machine Learning
  • Math Theory of Computation
  • Natural Language & Speech
  • Networks
  • Probabilistic Methods & Game Theoretic Methods
  • Programming Languages & Compilers
  • Robotics, Vision & Physical Modeling
  • Scientific Computing
  • Security and Privacy
  •  Software/Operating Systems
  • Systems Reliability/Dependability
Possible Research Topics and Areas

Following is a set of hot topics in the field of Theoretical and Applied Information Technology on which active research is being conducted by Institutes and Research Organizations across the Globe. Since they are on the public domain, everyone is free to take advantage of them but one should be careful that they do not collide in their research aims and names in the near future so it is recommended that you should chose the topic after careful consideration and modify your research aims accordingly. 
  • Security and Cryptography on WWW
  • Managing & analyzing large volumes of dynamic & diverse data
  • Privacy and Databases
  • A System for Integrated Management of Data, Accuracy, and Lineage
  • Agile Engineering Methods for Distributed Dependable Systems
  • Modeling Complex Systems
  • Design Patterns for Distributed Dependable Control Systems
  • Agent Oriented Software Engineering
  • Design and Analysis Methods for Multi-Agent Systems
  • Software Engineering Methods and Tools for Soft Computing
  • E-commerce challenges and solutions
  • Automated E-commerce negotiation agents
  • Database management system for XML
  • Tradeoffs in Replication Precision and Performance
  • Trusted Image Dissemination
  • Integrating database queries & Web searches
  • Compiling High-level Access Interfaces for Multi-site Software
  • Content-based Image Retrieval
  • Digital Library Technologies
  • Parallel Query Optimization
  • Large-scale Interoperation and Composition
  • Scalable Knowledge Composition
  • Privacy and Databases
  • High Performance Knowledge Bases
  • Computational Game Theory
  • Multi-Agent Learning
  • Digital Circuit Optimization
  • Transactional Coherence and Consistency
  • Visualizing Large VLSI Datasets
  • Global Optimization and Self-Calibration of CMOS Analog Circuits
  • Computational Law
  • General Game Playing
  • Logical Spreadsheets
  • Collaborative Commerce
  • Global Trading Catalog
  • Exploration of indigenous language dictionaries
  • Textual Inferences
  • Shallow Semantic Parsing
  • Unsupervised Language Learning
  • Question Answering with Statistics and Inference
  • Clustering Models
  • Statistical Machine Translation
  • Design of Ad-hoc Wireless Networks for Real-Time Media
  • Compression and Streaming
  • Optimized Video Streaming
  • Image and Signal Processor
  • Scalable Network Fabrics
  • High Speed Signaling
  • System-Level Design Tools and Hardware/Software Co-design
  • Web Password Hashing
  • Preventing online identity theft and phasing
  • Software Quality and Infrastructure Protection for Diffuse Computing
  • Agile Management of Dynamic Collaboration
  • Computational modeling of signal transduction pathways
  • Robotics
  • Artificial Intelligence
  • Validity Check
  • Electronic Voting
  • Verification of high-level designs
  • Statistics and Data Mining
  • Computer Ethics
  • Privacy, Right of Freedom Of Information
  • Standardizing E-Commerce Protocols
  • Software Metrics and Models
  • Software Configuration Management Patterns
  • Approximation Algorithms
  • Design of Network Topology
  • Software Development Technologies For Reactive, Real-Time, and Hybrid Systems
  • Modeling Flexible Protein Loops
  • Study of Protein Motion
  • Sensing of Deformable Objects
  • Adaptive Dynamic Collision Checking
  • Climbing Robots
  • Deformable Object Simulation
  • Robots on Rough Terrain
  • Textual Inferences
  • Machine Learning Control
  • Enterprise Software, Solutions, and Services
  • E-commerce and the World Wide Web
  • Future of Web Services
  • Electronic surveillance
  • Software Model for Game Programming
  • Extreme Programming
  • Agile Software Development
  • Reliable Component-Based Software Systems
  • Engineering and Technology Management
  • Application of Virtual Reality
  • Digital Convergence
  • Applications of Data warehousing and data mining
  • IP Telephony
  • Genetic Engineering
  • Security threats through Spy ware
  • Software Architecture Patterns
  • Object Oriented Design Patterns and Frameworks
  • Grid Computing
  • FPGA
  • Voice Technology
  • Controlling Pornography and Computer Crime over Internet
  • Internet and the Economic Revolution
  • Ad-Hoc Networks Modeling
  • Globalization and Computers
  • Computer Aided Design
  • Bioinformatics and Biometrix
  • Computer Technology and Government
  • Computer Crimes Cyberspace Social Aspects
  • Human Computer Interaction
  • Robust IP security
  • Mechanisms for Friendly Robotics
  • Multi-directional Motion Planning
  • Manipulation Planning
  • Surgical Simulation
  • Next-Generation Grids and Distributed Systems
  • Peer to Peer Computing
  • Distributed Data Management
  • Design and Manufacturing
  • Repositories of Reusable Knowledge
  • Randomized Motion Planning
  • Technology-Assisted Surgery
  • Human Motion Simulation
  • Human-Centered Machine Design
  • Simulation & Active Interfaces
  • Graphics System and Architecture
  • Interactive Workspaces
  • Computational Photography
  • Multi-graphics
  • Real-Time Programmable Shading
  • Rendering Algorithms
  • Simulation & Analysis of Muscle Models
  • Virtual Human Simulation
  • Compression of synthetic images
  • Creating digital archives of 3D artworks
  • 3D fax machine
  • Responsive Workbench
  • Spreadsheets for Images
  • Texture Analysis and Synthesis
  • Visualizing Complex Systems
  • Volume Rendering
  • Predicate Abstraction
  • Verification of transaction-based protocols
  • Reconfigurable Wireless Networks for Multimode Communications
  • Smart Photonic Networks
  • Improving Program Robustness via Static Analysis and Dynamic Instrumentation
  • High-Level Area and Timing Estimation
  • Hardware-Software Co-Synthesis
  • Collaborative Co-Located Information Organization
  • Enabling Rapid Off-the-Desktop Prototyping
  • Notebooks that Share and Walls that Remember
  • Interactive Workspaces
  • HAL
  • Logic Programming Techniques
  • Data Compression and Coding
  • Human Language Technology
  • Information Discovery
  • Machine Learning and Data Mining
  • Security and Cryptography
  • Spatial Data
  • XML and Semi-Structured Data
  • Supporting co-located, collaborative work with computationally-enhanced tables.
  • A collaborative work environment
  • Beyond the Desktop
  • Interaction with Large Displays
  • Moving Information and Control
  • Defense against Distributed Denial of Service Attacks
  • Extreme Scale Cluster Architecture
  • Feedback Based Inter-domain Routing
  • History-based Anti-spam
  • Towards Self-Managed Wireless LANs
  • Interactive Workspaces
  • Recovery Oriented Computing
  • A collaborative work environment
  • Only Software & Recursive Micro-reboots
  • Decoupled Storage
  • Space Systems
  • Inference Web
  • Web Semantics Technologies
  • AI-bots
  • Repositories of Reusable Knowledge
  • An Object-Oriented Modular Reasoning System
  • Model-Based Support of Distributed Collaborative Design
  • Modeling, Analysis and Control of Hybrid Systems
  • Technology for Enhanced Reuse of Design Objects
  • Virtual Network System
  • Active Queue Management
  • Scaleable Performance Prediction and Efficient Network Simulation
  • Sensor Networks
  • TCP Performance
  • Energy Efficient Wireless Communication
  • Load Balancing
  • Multimedia over Networks
  • Stochastic Network Theory
  • Web Cache Performance and Analysis
  • Optical Router
  • Optimal Routing in the Internet
  • Parallel Packet Switch
  • Rate Control Protocol for Short-lived Flows
  • Single Buffered Routers
  • TCP Switching
  • High Performance Switching
  • Link Adaptation in Wireless Local Area Networks
  • Mobility in Cellular and Wireless Local Area Networks
  • Performance Assessment and Traffic Differentiation in Wireless Local Area Networks
  • Identity Based Encryption
  • Authenticating Streamed Data
  • Identity Based Encryption Email system
  • Intrusion tolerance via threshold cryptography
  • Security of cryptographic primitives and protocols
  • Remote Exploration and Experimentation
  • Reliability Obtained by Adaptive Reconfiguration
  • Agent Applications and Ontologies
  • Agent-Oriented Software Engineering
  • Agent Programming and Specification Languages
  • Concept-Based Retrieval and Interpretation for Large Datasets
  • Complex and Adaptive Systems
  • Constraint Programming
  • Declarative Debugging

Tuesday, 10 January 2012

Conquering the Cloud: 6 Pitfalls Preventing Scalability and How to Avoid Them

We’re all using the same servers. We all have access to the same software. The resources available to each of us are plentiful. Yet, some of us are winning and some of us are losing. Why?
Scalability.
Success in today’s Cloud marketplace requires you to become a highly scalable organization with laser-like focus on efficiency and reproducibility.
Join us as we explore how you can avoid 6 common pitfalls to scalability. We’ll discuss how you can take advantage of scaling your team, scaling your infrastructure and scaling your revenue to take advantage of the opportunity to successfully expand with the Cloud.

Cloud Hosting We recommend Scibero Hosting

ScienceLogic CTO Antonio Piraino Predicts Web Host Industry Trends for 2012

ScienceLogic CTO, Antonio Piraino, in a 2010 interview with WHIR TV ScienceLogic CTO, Antonio Piraino, in a 2010 interview with WHIR TV
(WEB HOST INDUSTRY REVIEW) — With a new year comes the desire to make change, and when it comes to web hosting, former VP of research at Tier1 Research and CTO of monitoring firm ScienceLogic Antonio Piraino says that hosting providers will need to make some serious improvements to keep up with where the industry is headed in 2012.
In an interview with the WHIR, Piraino says that there are four key areas in which web hosts will start to really focus on in terms of cloud development going forward.
“The things we see most hosts starting to up the ante on are security number one, network and management number two, and orchestration and automation would be three and four,” Piraino says.
Piraino predicts that there will be one or two huge cloud infrastructure breaches in 2012 since most companies tend not to be extremely proactive about their security until they have a problem. At the same time, he encourages hosts to not shy away from talking up their security to customers.
“On the one hand I’d say there is going to be a big attack but on the flip side I keep trying to tell hosts that they need to not be afraid to go and talk up their security because the average company in the United States, or in Europe, or anywhere else in the world has less security than the average host. I think that some of them will start to do it, but that it’s something that all of them should start to talk about,” Piraino says.
Web hosts that provide cloud services will see a greater spend on cloud computing, and the price of cloud computing will go up as hosts start to layer more differentiators and services on top of their infrastructure as a service, according to Piraino.
“There’s going to be higher margins made of cloud computing as well next year. Whatever hosts are not trying to do something in that regard or thinking in that regard are lagging behind for sure,” he says.
Hosts should not be afraid to raise their prices, Piraino says, but they can’t do so without elevating their services.
“A lot of them just don’t know how to elevate their services and I think there is going to be a big separation between the winners and losers next year because businesses are getting a lot more savvy about their options. There’s a lot more noise being made by the top hosting and cloud providers,” he says. “If I was a hosting provider today I would spend a lot more money on marketing than I ever have in the past and I think that’s what we’re going to see in the new year. We’re going to see a lot of marketing campaigns with big budgets from the leaders in the space and new services.”
Piraino says that every web host thinks they can differentiate themselves on support but it’s not enough.
“Unfortunately that’s not a differentiator between each other. It is a differentiator towards Amazon perhaps, but even there you’re going to have to start elevating the kind of technology and services you offer,” he says.
Another trend Piraino foresees in 2012 is more service providers becoming service brokers in that they resell other technologies such as Amazon or third-party reporting systems.
Piraino says web hosts need to prepare for cloud 2.0 or hosting 3.0.
“[Hosting 3.0] is the ability to layer high-margin services on top of that underlying infrastructure and that’s where things like the more automated you are the better your margins are going to be because now you’re not having to hire more and more people who are expensive to do all these manual workflows,” he says.
By tying all the pieces together, Piraino says web hosts will save on cost and give them a differentiator and the ability to be more attractive to their customers. He says those web hosts who don’t implement automated systems are really going to start losing out.

Saturday, 7 January 2012

iPad rumor mill hits high gear, as do Apple's plans for China

The Apple rumor mill went into high gear this week, with reports of multiple iPads, giant televisions, and mystery events later in the month.
One tidbit of official news is that the company is planning to bring the iPhone 4S to China and 21 other countries next week. The move, which was expected, should give the 4S a healthy sales boost considering that China has become a top market for smartphones. In Apple's most recently reported quarterly earnings, Greater China came in second (behind North America) on the company's list of top revenue-generation regions.
You can read more about these stories and others--along with the usual dose of rumors--below.
Apple Talk Weekly rounds up of some of the top Apple-related news and rumors. It appears every Saturday morning and is curated by CNET's Apple reporter, Josh Lowensohn.

Iran squeezes Web surfers, prepares censored national intranet

The Iranian Cyber Police published new rules on Wednesday designed to allow officials to know exactly who is visiting what Web sites. Before they can log on, Iranians are required to provide their name, father's name, address, telephone number and national ID, according to an Iranian media report cited by Radio Free Europe. Cafe owners will be required to install security cameras and to keep all data on Web surfers, including browsing history, for six months.
The rules, which come as the country prepares for parliamentary elections in March, are a deterrent to activists who might want to use the Internet cafes to organize protests. Calls to boycott elections distributed via social networks or e-mail will be treated as national security crimes, the Iranian judiciary announced last week, according to a report today in the Wall Street Journal. Government officials claim they need to control access to the Internet to counter what they say is a "soft" cultural war being waged by Western countries to influence the morals of Iranians.
Monitoring Web surfers is an interim measure until the government is done building out its own domestic intranet that is "halal," or pure. Initially, the Iran intranet will run in tandem with the Internet before the global Web is shut off to the 23 million Internet users in Iran, according to reports. Payam Karbasi, spokesman for Iran professional union Corporate Computer Systems, told Iranian media that the domestic network, which was announced last March, would be launched in coming weeks, the WSJ reported.
Iranians have reported that during the intranet tests this week, Internet connections have slowed down and Web sites have been blocked. Access to VPNs (virtual private networks) Iranians use to access sites like Facebook, Twitter and YouTube have also been affected, reports said.
Widespread protests over purported fraud in the 2009 election, which brought President Mahmoud Ahmadinejad back to office, prompted the Iranian government to cut off access to opposition Web sites and mobile telephone networks. But protesters flocked to Twitter and Facebook to skirt the communications crackdown, to spread videos and news and to organize demonstrations. Tor and other tools were then used to get around government shutdowns of those sites.
Some of the extreme censorship measures adopted by Iran have also been used in Libya and in China, which deploys the "Great Firewall" to keep objectionable content out of the country. China also requires identification to use Internet cafes in Beijing, and has a history of shutting down blogs as well as allegedly meddling with Gmail and targeting activists with cyber attacks.

Thursday, 5 January 2012

Jobs Requiring Cloud Computing Skills Grow by 61 Percent

Candidate Supply of Sales Managers with Cloud Computing Skills and Experience

(WEB HOST INDUSTRY REVIEW) -- Marketplace talent resource WANTED Analytics announced on Thursday that according to The Hiring Scale, employers and staffing firms have posted more than 10,000 job ads that included requirements for cloud computing skills and experience in the past 90 days.
As part of the WANTED Analytics platform, the Hiring Scale measures conditions in local job markets by comparing hiring demand and labor supply.
According to the study, more than 2,400 companies posted job ads during this 90-day period and hiring demand grew 61 percent year-over-year.
Computer specialists and programmers are most commonly required to have cloud computing experience. But as cloud technology continues to impact other areas of business, additional fields are more commonly required to understand and work with cloud-based applications.
Other jobs that most often include these skills in job ads include marketing managers, sales managers, customer service representatives, and cargo and freight agents.
The study showed that the metropolitan area with the highest volume of job ads for cloud computing skills during the past 90 days was San Francisco, where recruiters in this area placed more than 1,000 unique job listings, representing a 95 percent year-over-year growth.
Other cities with high demand included Seattle, Washington, DC, New York, and San Jose, which was the only location to see a year-over-year decline in the volume of online job postings.
Recruiters in the San Jose area posted 12 percent fewer job ads than in the same 90-day period last year.
Recruiting conditions for cloud computing skills are likely to be moderately difficult with conditions varying based on the talent supply and hiring demand in each location.
According to the Hiring Scale, Recruiters sourcing for openings in Washington, DC are likely to experience one of the most difficult recruiting conditions in the United States.
It is likely that Recruiters in the Washington, DC metropolitan area will see a longer time-to-fill since job ads are posted online longer than the national average of 44 days.

Cloud Security Firm Gazzang Joins AWS Service Provider Program

An illustration on Gazzang's website breaks down its prices for 2012

(WEB HOST INDUSTRY REVIEW) -- Cloud security provider Gazzang has joined Amazon Web Services service provider partner program, according to an announcement made by the company on Thursday.
This announcement comes less than a month after Gazzang named Dustin Kirkland its chief architect.
Gazzang says this will provide Amazon customers with the ability to improve security through an encryption platform for data protection, access control and key management.
In 2011, Gazzang partnered with web hosting providers . It also added support for the CloudLinux platform to its ezNcrypt data security solution. Gazzang improves the stability of shared hosting and multi-tenant environments.
The AWS solution provider program will help Gazzang broaden its suite of offerings and expand its customer base while driving new revenue streams, according to the press release.
"Gazzang products have been built in the cloud for customers who require extreme scalability and rapid deployment of cloud services," Larry Warnock, CEO at Gazzang said in a statement. "Our on-demand, high-performance cloud security model puts the power of encryption, access control and key management services within reach for thousands of Amazon customers. We are excited to be working together with the AWS team and look forward to bringing a rich portfolio of new cloud data security services to market."
Gazzang says its ezNcrypt Flex Platform helps customers protect, encrypt and provide key management for open source databases like MySQL, PostgreSQL, MongoDB and Cassandra, and web servers like Apache, Nginx and Tomcat. ezNcrypt for Databases is a security application for LinuxOS that includes preconfigured rules, while ezNcrypt Flex allows custom rules.
The ezNcrypt platform installs in minutes and allows customers to create, control and administer their own keys - a feature usually exclusive to more expensive databases, according to the press release.