Thesis Helpers

computer information systems research paper topics

Find the best tips and advice to improve your writing. Or, have a top expert write your paper.

130 Information Technology Research Topics And Quick Writing Prompts

Information Technology Research Topics

The field of information technology is one of the most recent developments of the 21st century. Scholars argue that we are living in a technological age. Despite this buzz, however, many students still find it challenging to compose an information technology research topic.

Nonetheless, we are here to show you the way and lead you accordingly. Let us explore professional topics in information technology together then.

Quality Information Technology Topics For Research Paper

  • The effects of Artificial Intelligence on complex and tedious tasks
  • Discuss the development of computational & synthetic biology in research
  • What are the limitations to the study of computer architecture in colleges?
  • Discuss the evolution of animation, computer graphics, and game science
  • Critically analyze how computing is contributing to the development
  • What are the emerging fields of study in computer data science?
  • How to manage data in the age of the 5G technology
  • The impact of human-computer interaction on innovations
  • How is machine learning exposing students to more recent opportunities in life?
  • Evaluate molecular information systems and their role in biotechnology
  • How information technology has contributed to natural language processing
  • What are the latest developments in programming languages and software engineering
  • Analyze emerging opportunities in the field of Robotics

College Research Paper Topics in Information Technology

  • The rising security and privacy concerns with technological advancements
  • What are the considerations when setting up systems and networking?
  • Discuss the theory of computation and its contribution to information technology
  • Why is ubiquitous computing attracting fewer students?
  • The role of wireless and sensor systems in making the world a safe place
  • Reasons, why cloud computing has helped save on space and efficiency
  • Why are most computer students comprised of the male?
  • Discuss the essence of amorphous computing in the 21st century
  • How has biomedical mining impacted the health sector?
  • Can cyborgs relate well with the man?
  • How neural networking is making brain surgery a swift process
  • The role of swarm intelligence in collaboration and brainstorming
  • How are companies maximizing the use of Big Data?

List of Topics For Research Paper in Information Technology

  • Discuss how the Internet of Things is transforming how people conduct their activities
  • Challenges to software-defined networking
  • How are marketers and promoters taking up software as a service?
  • The role of augmented reality and virtual reality in healthcare systems
  • How intelligent apps are making life easier for man
  • The role of information technology in detecting fake news and malicious viral content
  • Long term effects of a technologically oriented world
  • Technological advancements that made it possible for the SpaceX shuttle to land on the International Space Station
  • How technology is making learning more practical and student-centered
  • What role has technology played in the spread of world pandemics?
  • How are governments able to shut down the Internet for their countries during particular events?
  • Does social media make the world a global village or a divided universe?
  • Discuss the implications of technological globalization

Unique Information Technology Research Topics

  • Discuss the areas of life which have been least exploited using technology
  • What are the considerations for setting up an educational curriculum on computer technology?
  • Compare and contrast between different computer processing powers
  • Why is Random Access Memory so crucial to the functioning of a computer?
  • Should computer as a subject be mandatory for all students in college?
  • How information technology has helped keep the world together during the quarantine period
  • Discuss why most hackers manage to break firewalls of banks
  • Are automated teller machine cards a safe way of keeping your bank details?
  • Why should every institution incorporate automated systems in its functions?
  • Who is more intelligent than the other? Man or Computer systems?
  • How is NASA implementing the use of Information technology to explore space?
  • The impact of automated message replies on smartphones.
  • Do mobile phones contain radiations that cause cancer?

IT Research Topics For High School Students

  • How does natural language processing compare with machine learning?
  • What is the role of virtual reality in the entertainment industry?
  • Discuss the application of computer vision technology in autonomous cars
  • How have CCTVs assisted in keeping the world safe?
  • Effects of phishing and spying on relationships
  • Why cyber espionage is on the rise in the face of the 5G technology
  • Compare and contrast between content-based recommendation vs. collaborative filtering
  • Evaluate the interconnection between the Internet of things and artificial intelligence
  • Analyze the amount of data generated from the Internet of things in devices
  • Ethical and legal implications of various technological practices
  • How technology has contributed to the formation of Genetically Modified Organisms
  • Describe in detail the vaccine development process
  • Why nanotechnology may be the only hope left in treating HIV

Hot Topics in IT

  • How companies can incorporate information technologies in their policy management systems
  • The role of IT in enhancing service delivery in customer care centers
  • How IT has made advertising more appealing and authentic to the consumer
  • Discuss the innovation of the Next Generation education systems
  • Why are there fewer Information Technology colleges and universities in developing countries?
  • Discuss WIFI connectivity in developed countries
  • What are the considerations when purchasing a Bandwidth Monitor?
  • How to create an effective Clinic Management System for intensive care
  • Factors that necessitate the development of an Enterprise Level System Information Management
  • Is it possible to develop fully functional Intelligent Car Transportation Systems?
  • Why the world should adopt E-Waste Management systems ASAP
  • Discuss the impact of weather and climate on internet strength and connectivity
  • The role of advanced information technologies preserving classified documents

Interesting Information Technology Topics

  • Human resource information management systems in large organizations
  • Evaluate the effectiveness of online enterprise resource planning
  • A critical analysis of object tracking using radial function networks
  • How has Bluetooth mobile phone technology developed over time?
  • Ethical challenges arising from new media information technologies
  • How the computer has developed over the last decade
  • The role of social media in enhancing communication strategies
  • Why new media technologies have made physical newspapers obsolete
  • The impact of the Internet of news sourcing, production, distribution, and sharing
  • Discuss the structures of various communication structures
  • How social media is making ads easily accessible
  • The impact of social networking sites on personal contact
  • Discuss the latest content marketing ideas in the wake of information technology

Topics Related To Information Technology

  • The impact of media exposure to adolescents and teenagers
  • How mass media is slowly but surely taking over the place of personal socialization
  • How to use the Internet and interactive media as advertising tools
  • Discuss the trends in music marketing in a digital world
  • The use of hype in new media technologies
  • The impact of using YouTube and video blogs in communication messages
  • Discuss the challenges that are arising as a result of new media technologies
  • How to build trustful relationships in virtual communication channels
  • Why it is impossible to maintain privacy in social media
  • Reasons why cyberbullying continues to persist in various communication technologies
  • The change in interpersonal communication with the invention of information technology
  • Is the future of information technologies right?
  • Discuss how sensationalism is persisting in the wake of new media technologies

Research Proposal Topics in Information Technology

  • Is it possible to live in a world without social media?
  • The impact of mass media on morality and decency in the 21st century
  • Advantages and disadvantages of renewable energy sources
  • How effective is hydrogen power over others?
  • An overview of renewable energy technologies
  • The impact of robots in improving food safety
  • How are drones useful in keeping large acres of land secure?
  • The impact of 3D printing on the practice of medicine
  • The effectiveness of having robots in infectious disease units
  • The impact of hydroponic farming
  • How to improve disease control using technology
  • Eliminating poisonous substances in food using technology
  • The effectiveness of robotic surgeries

Hot Topics in Computer Science

  • Distinguish between virtual reality and human perception
  • How are the inventions in the field of computer science transforming the world
  • Evaluate the effectiveness of high-dimensional data modeling
  • Limitations to the field of computer science
  • Are colleges and universities producing competent computer scientists?
  • How ethical hacking has turned out to be worse
  • The essence of having specialized banking systems
  • What is the most effective security measure: A serial code or fingerprint?
  • The development of programming languages
  • The effect of computational thinking on science
  • Is it possible to eliminate stalking?
  • Ways of improving patent rights for technological innovations
  • An overview of the different types of software security

Did you find an IT topic for your assignment? If not, our expert thesis writers are here for you. Order a research paper from us today and get to enjoy professional services.

cybersecurity research topics

Make PhD experience your own

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ct-logo

Top 400 Information Technology Research Topics – Full Guide!

The field of IT is progressive and ever-changing due to the rapid development of hardware, software, and networking technologies. The demand for innovative research in IT has also continued to rise as businesses and organizations embrace digital systems and data-driven solutions. 

Understanding the salient areas of study in IT will help professionals keep up with changes that arise and enable organizations to leverage emerging technologies effectively. 

Cybersecurity, artificial intelligence, cloud computing , and big data analytics have emerged through IT research. These fundamental factors shape the modern technology landscape, giving rise to immense possibilities for boosting productivity, raising efficiency, and improving competitiveness across sectors. 

However, companies wanting to navigate the complexities of today’s digital age and exploit new technological advances must examine some of the latest IT research topics.

Understanding Information Technology Research

Table of Contents

In the world of technology, research is a compass that helps us navigate its convoluted evolutions. For instance, Information Technology (IT) research has been conducted in computer science, software engineering, data analytics, and cybersecurity.

IT research involves systematic inquiry to advance knowledge, problem-solving, and innovation. This includes conducting rigorous experiments and analyzing results to unveil new theories or approaches that improve technologies or bring breakthroughs.

Therefore, interdisciplinarity is at the core of IT research, with collaboration cutting across various disciplines. Whether using AI to reinforce cyber security or big data analytics in healthcare, collaboration leads to solutions to complex problems.

This is because IT research is changing rapidly due to technological advances. Thus, researchers need to be up-to-date to make meaningful contributions.

Ethics are involved so that technology can be responsibly deployed. The researchers grapple with privacy, security, bias, and equity issues to ensure technology benefits society.

As a result of this publication and conferences, which enable dissemination of findings, leading to further innovations, collaboration has supported progress, hence speeding it up.

Understanding IT research is vital for leveraging technology to address societal challenges and foster positive change.

Recommended Readings: “ Top 109+ Media Bias Research Topics | Full Guide! “.

Picking the Right Topic to Research: The Key to Finding New Things 

In the always-changing world of information technology, choosing the proper topic to research is like starting a smart path. It’s a big decision that sets where your hard work will go and how much your findings could mean.

Fitting with Industry Moves and Issues

Finding a research topic that fits current industry moves and big issues is important. By staying informed on the latest happenings and problems in the technology field, you can ensure your research stays useful and helps solve real-world troubles.

Growing Fresh Ideas and Practical Uses

Choosing a research topic that generates fresh ideas and practical applications is crucial. Your findings should not just add to school talks but also lead to real solutions that can be used in real situations, pushing technology forward and making work smoother.

Sparking Mind Curiosity and Excitement

Selecting a research topic that sparks your curiosity and excitement is essential. When you dive into an area that truly fascinates you, the research journey becomes more engaging, and your drive to uncover big insights is stronger.

Finding Gaps and Unexplored Areas

Finding gaps in existing knowledge or unexplored areas in the technology landscape can lead to big discoveries. Entering uncharted spaces can uncover fresh insights and meaningfully advance the field.

Considering Potential Wide Effect and Growth

Considering your research topic’s potential wide effect and growth is crucial. Will your findings have far-reaching effects across industries? Can your solutions grow and shift to address changing challenges? Evaluating these things can help you prioritize research areas with the greatest potential for big impact.

By carefully choosing the right research topic, you can open the door to discoveries, push technology forward, and contribute to the constant evolution of the technology information landscape.

Top 400 Information Technology Research Topics

The list of the top 400 information technology research topics is organized into different categories. Let’s examine it. 

Artificial Intelligence (AI) and Machine Learning (ML)

  • Easy AI: Explaining and Using
  • Group Learning: Getting Better Together
  • AI in Health: Diagnosing and Helping
  • Robots Learning on Their Own
  • Being Fair with Computers
  • Talking to Computers in Normal Language
  • AI Fighting Bad Guys on the Internet
  • AI Driving Cars: How Safe Is It?
  • Sharing What We’ve Learned with Other Machines
  • AI in Schools: Computers Learning About You

Cybersecurity and Encryption

  • Trusting Computers: How to Stay Safe
  • Keeping Secrets Safe with Fancy Math
  • Secret Codes Computers Use: Safe or Not?
  • Spy Games: Watching Out for Bad Stuff
  • Keeping Secrets, Even from Friends
  • Your Body as Your Password: Is It Safe?
  • Fighting Against Computer Ransomers
  • Keeping Your Secrets Secret, Even When Sharing
  • Making Sure Your Smart Stuff Isn’t Spying on You
  • Insuring Against Computer Bad Luck

Data Science and Big Data

  • Sharing Secrets: How to Be Safe
  • Watching the World in Real-Time
  • Big Data: Big Computers Handling Big Jobs
  • Making Data Pretty to Look At
  • Cleaning Up Messy Data
  • Predicting the Future with Numbers
  • Finding Patterns in Connected Dots
  • Keeping Your Secrets Safe in Big Data
  • Sharing Our Secrets Without Telling Anyone
  • Helping the Planet with Numbers

Cloud Computing

  • Computers Without a Home: Where Do They Live?
  • Keeping Computers Close to Home
  • Moving Our Stuff to New Homes
  • Juggling Many Clouds at Once
  • Making Computers That Live in the Cloud
  • Keeping Clouds Safe from Bad Guys
  • Keeping Clouds Safe from Sneaky Spies
  • Making Sure Clouds Do What They’re Supposed To
  • Computers Need Energy Too!
  • Making the Internet of Things Even Smarter

Internet of Things (IoT)

  • Smart Stuff Everywhere: How Does It Work?
  • Watching Out for Bad Stuff in Smart Things
  • Smart Stuff: Is It Safe?
  • Taking Care of Smart Toys
  • Making Smart Things That Don’t Need Batteries
  • Making Smart Factories Even Smarter
  • Smart Cities: Making Cities Better Places to Live
  • Your Clothes Can Be Smart, Too!
  • Helping Farmers with Smart Farming
  • Keeping Secrets Safe in Smart Stuff

Human-Computer Interaction (HCI)

  • Magic Glasses: How Do They Work?
  • Making Computers Easy to Use
  • Making Computers for Everyone
  • Talking to Computers with Your Hands
  • Making Sure Computers Are Nice to People
  • Talking to Computers with Your Voice
  • Playing with Computers, You Can Touch
  • Trusting Computers to Drive for Us
  • Computers That Understand Different People
  • Making Computers That Read Our Minds

Software Engineering

  • Making Computers Work Together Smoothly
  • Building Computers from Tiny Pieces
  • Playing Games to Make Computers Better
  • Making Sure Computers Work Right
  • Making Old Computers New Again
  • Making Computers Like to Exercise
  • Making Computers Easier to Understand
  • Building Computers with Blueprints
  • Making Sure Computers Don’t Get Sick
  • Sharing Computer Secrets with Everyone

Mobile Computing

  • Keeping Phones Safe from Bad Guys
  • Making Apps for Every Kind of Phone
  • Keeping Phones Safe in the Cloud
  • Finding Your Way with Your Phone
  • Paying with Your Phone: Safe or Not?
  • Checking Your Health with Your Phone
  • Seeing the World Through Your Phone
  • Wearing Your Phone on Your Wrist
  • Learning on the Go with Your Phone
  • Making Phones Even Smarter with Clouds

Networking and Communications

  • Making Sure Computers Can Talk to Each Other
  • Making Computers Work Together Without Wires
  • Making the Internet Faster for Everyone
  • Getting More Internet Addresses for More Computers
  • Cutting the Internet into Pieces
  • Making the Internet Even More Invisible
  • Talking to Computers with Light
  • Making Sure Tiny Computers Talk to Each Other
  • Sending Messages Even When It’s Hard
  • Making the Radio Smarter for Computers

Bioinformatics and Computational Biology

  • Reading Your DNA with Computers
  • Making Medicine Just for You
  • Meeting the Microscopic World with Computers
  • Building Computer Models of Living Things
  • Finding New Medicine with Computers
  • Building Computer Models of Tiny Machines
  • Making Family Trees for Living Things
  • Counting Germs with Computers
  • Making Big Lists of Living Things
  • Making Computers Think Like Brains

Quantum Computing

  • Making Computers Better at Some Math Problems
  • Keeping Computers Safe from Small Mistakes
  • Making Computers Even Harder to Spy On
  • Making Computers Learn Faster with Quantum Tricks
  • Making Fake Worlds for Computers to Explore
  • Building Computers from Super-Cold Stuff
  • Making Computers Cold to Think Better
  • Making Computers Think Like Chemists
  • Making the Internet Even Safer with Computers
  • Showing Off What Computers Can Do Best

Green Computing

  • Saving Energy with Computers
  • Using Wind and Sun to Power Computers
  • Making Phones Last Longer Without Plugging In
  • Making Computers Kinder to the Planet
  • Recycling Old Computers to Save the Earth
  • Computers That Care About Their Trash
  • Saving Energy in Big Rooms Full of Computers
  • Making Computers Save Energy and Work Faster
  • Counting the Trash from Computers
  • Making Computers Kinder to the Planet’s Air

Information Systems

  • Making Computers Work Together in Big Companies
  • Making Computers Remember Their Friends
  • Making Computers Share What They Know
  • Making Computers Smart About Money
  • Making Computers Send Presents to Their Friends
  • Helping Computers Make Big Decisions
  • Making Government Computers Talk to Each Other
  • Making Computers Count Likes and Shares
  • Assisting computers to Find What You Asked For
  • Assisting companies to Keep Their Friends Happy

Semantic Web and Linked Data

  • Making Computers Understand Each Other Better
  • Making Computers Talk About Themselves
  • Making the Internet More Friendly for Computers
  • Helping Computers Find What They Need
  • Making Computers Smarter by Talking to Each Other
  • Making Computers Friends with Different Languages
  • Making Computers Understand Different Ideas
  • Making Computers Think Like Us
  • Making Computers Smarter About Old Stuff
  • Making Computers Share Their Secrets Safely

Social Computing and Online Communities

  • Making Friends on the Internet
  • Getting Good Suggestions from the Internet
  • Making Computers Work Together to Solve Problems
  • Learning from Your Friends on the Internet
  • Stopping Fake News on the Internet
  • Knowing How People Feel on the Internet
  • Helping Each Other on the Internet During Emergencies
  • Making Sure Computers Are Nice to Everyone
  • Keeping Secrets on the Internet
  • Making the Internet a Better Place for Everyone

Game Development and Virtual Worlds

  • Making Games That Play Fair
  • Letting Computers Make Their Fun
  • Making Fake Worlds for Fun
  • Learning with Games
  • Making the Rules for Fun
  • Watching How People Play Together
  • Seeing Things That Aren’t There
  • Letting Lots of People Play Together
  • Making the Engines for Fun
  • Playing Games to Learn

E-Learning and Educational Technology

  • Making Learning Easy for Everyone
  • Taking Classes on the Internet
  • Learning from Your Computer’s Teacher
  • Learning from What Computers Know
  • Learning Anywhere with Your Computer
  • Making Learning Fun with Games
  • Learning Without a Real Lab
  • Learning with Free Stuff on the Internet
  • Mixing School with Your Computer
  • Making School More Fun with Your Computer

Digital Forensics and Incident Response

  • Solving Computer Mysteries
  • Looking for Clues in Computers
  • Finding Bad Guys on the Internet
  • Looking for Clues on Phones and Tablets
  • Hiding Clues on Computers
  • Helping When Computers Get Sick
  • Solving Mysteries While the Computer Is On
  • Finding Clues on Your Smart Watch
  • Finding Tools for Finding Clues
  • Following the Rules When Solving Mysteries

Wearable Technology and Smart Devices

  • Keeping Healthy with Smart Watches
  • Making Clothes That Talk to Computers
  • Listening to the Earth with Your Shirt
  • Wearing Glasses That Show Cool Stuff
  • Making Your Home Smarter with Your Phone
  • Using Your Body to Unlock Your Phone
  • Helping People Move with Special Shoes
  • Assisting people to See with Special Glasses
  • Making Your Clothes Do More Than Keep You Warm
  • Keeping Secrets Safe on Your Smart Stuff

Robotics and Automation

  • Making Friends with Robots
  • Letting Robots Do the Hard Work
  • Robots That Work Together Like Ants
  • Learning Tricks from People
  • Robots That Feel Like Jelly
  • Helping Doctors and Nurses with Robots
  • Robots That Help Farmers Grow Food
  • Making Cars Without People
  • Teaching Robots to Recognize Things
  • Robots That Learn from Animals

Health Informatics

  • Computers That Help Doctors Keep Track of Patients
  • Sharing Secrets About Your Health with Other Computers
  • Seeing the Doctor on Your Computer
  • Keeping Track of Your Health with Your Phone
  • Making Medicine Better with Computers
  • Keeping Your Health Secrets Safe with Computers
  • Learning About Health with Computers
  • Keeping Health Secrets Safe on the Internet
  • Watching Out for Germs with Computers
  • Making Sure the Doctor’s Computer Plays Nice

Geographic Information Systems (GIS)

  • Watching the World Change with Computers
  • Making Maps on the Internet
  • Seeing the World from Very Far Away
  • Finding Hidden Patterns with Computers
  • Making Cities Better with Computers
  • Keeping Track of the Earth with Computers
  • Keeping Track of Wild Animals with Computers
  • Making Maps with Everyone’s Help
  • Seeing the World in 3D
  • Finding Things on the Map with Your Phone

Knowledge Management

  • Helping Computers Remember Things
  • Making Computers Talk About What They Know
  • Finding Secrets in Big Piles of Data
  • Helping Companies Remember What They Know
  • Sharing Secrets with Computers at Work
  • Making Computers Learn from Each Other
  • Making Computers Talk About Their Friends
  • Making Companies Remember Their Secrets
  • Keeping Track of What Companies Know

Computational Linguistics and Natural Language Processing (NLP)

  • Finding Out How People Feel on the Internet
  • Finding Names and Places in Stories
  • Making Computers Talk to Each Other
  • Making Computers Answer Questions
  • Making Summaries for Busy People
  • Making Computers Understand Stories
  • Making Computers Understand Pictures and Sounds
  • Making Computers Learn New Words
  • Making Computers Remember What They Read
  • Making Sure Computers Aren’t Mean to Anyone

Information Retrieval and Search Engines

  • Finding Stuff on the Internet
  • Getting Suggestions from the Internet
  • Finding Stuff at Work
  • Helping Computers Find Stuff Faster
  • Making Computers Understand What You Want
  • Finding Stuff on Your Phone
  • Finding Stuff When You’re Moving
  • Finding Stuff Near Where You Are
  • Making Sure Computers Look Everywhere for What You Want

Computer Vision

  • Finding Stuff in Pictures
  • Cutting Up Pictures
  • Watching Videos for Fun
  • Learning from Lots of Pictures
  • Making Pictures with Computers
  • Finding Stuff That Looks Like Other Stuff
  • Finding Secrets in Medical Pictures
  • Finding Out If Pictures Are Real
  • Looking at People’s Faces to Know Them

Quantum Information Science

  • Making Computers Learn Faster with Tricks

Social Robotics

  • Robots That Help People Who Have Trouble Talking
  • Robots That Teach People New Things
  • Making Robots Work with People
  • Helping Kids Learn with Robots
  • Making Sure Robots Aren’t Mean to Anyone
  • Making Robots Understand How People Feel
  • Making Friends with Robots from Different Places
  • Making Sure Robots Respect Different Cultures
  • Helping Robots Learn How to Be Nice

Cloud Robotics

  • Making Robots Work Together from Far Away
  • Making Robots Share Their Toys
  • Making Robots Do Hard Jobs in Different Places
  • Making Robots Save Energy
  • Making Robots Play Together Nicely
  • Making Robots Practice Being Together
  • Making Sure Robots Play Fair
  • Making Robots Follow the Rules

Cyber-Physical Systems (CPS)

  • Making Robots Work Together with Other Things
  • Keeping Robots Safe from Small Mistakes
  • Keeping Factories Safe from Bad Guys
  • Making Sure Robots Respect Different People
  • Making Sure Robots Work Well with People
  • Keeping Robots Safe from Bad Guys
  • Making Sure Robots Follow the Rules

Biomedical Imaging

  • Taking Pictures of Inside You with Computers
  • Seeing Inside You with Computers
  • Cutting Up Pictures of Inside You
  • Finding Problems Inside You with Computers
  • Cutting Up Pictures and Putting Them Together
  • Counting Inside You with Pictures
  • Making Pictures to Help Doctors
  • Making Lists from Pictures Inside You
  • Making Sure Pictures of You Are Safe

Remote Sensing

  • Watching Earth from Far Away with Computers
  • Making Pictures of Earth Change
  • Taking Pictures from Very High Up
  • Watching Crops Grow with Computers
  • Watching Cities Grow with Computers
  • Watching Earth Change with Computers
  • Watching Earth from Far Away During Emergencies
  • Making Computers Work Together to See Earth
  • Putting Pictures of Earth Together
  • Making Sure Pictures of Earth Are Safe

Cloud Gaming

  • Playing Games from Far Away
  • Making Games Work Faster from Far Away
  • Keeping Games Safe from Bad Guys
  • Making Sure Everyone Can Play Together
  • Making Games Faster from Far Away
  • Watching People Play Games from Far Away
  • Making Sure Games Look Good from Far Away
  • Watching Games Get More Popular

Augmented Reality (AR)

  • Making Glasses That Show Cool Stuff
  • Making Cool Stuff for Glasses to Show
  • Watching Glasses Follow You
  • Watching Phones Show Cool Stuff
  • Making Cool Stuff to Show with Phones
  • Making Places Even Better with Phones
  • Making Factories Even Better with Glasses
  • Making Places Even Better with Glasses
  • Making Sure Glasses Don’t Scare Anyone

Virtual Reality (VR)

  • Making Glasses That Show Different Worlds
  • Making Glasses That Follow Your Hands
  • Making Therapy Fun with Glasses
  • Making Learning Fun with Glasses
  • Making Glasses That Make Jobs Safer
  • Making Glasses That Show Your Friends
  • Making Sure Glasses Are Friendly
  • Making Glasses That Make Buildings Better
  • Making Sure Glasses Aren’t Scary

Digital Twins

  • Making Computers That Copy the Real World
  • Making People Better with Computers
  • Making Flying Safer with Computers
  • Making Cars Safer with Computers
  • Making Energy Better with Computers
  • Making Buildings Better with Computers
  • Making Cities Safer with Computers
  • Making Sure Computers Copy the Real World Safely
  • Making Computers Follow the Rules

Edge Computing

  • Making Computers Work Faster Near You
  • Keeping Computers Safe Near You
  • Making Computers Work with Far-Away Computers
  • Making Computers Work Fast with You
  • Making Computers Work Together Near You
  • Making Phones Work Faster Near You
  • Making Computers Work Near You
  • Making Computers Work in Busy Places

Explainable AI (XAI)

  • Making Computers Explain What They Do
  • Making Medicine Safer with Computers
  • Making Money Safer with Computers
  • Making Computers Safe to Drive Cars
  • Making Computers Fair to Everyone
  • Making Computers Explain What They Think
  • Making Computers Easy to Understand

Blockchain and Distributed Ledger Technology (DLT)

  • Making Secret Codes Computers Use
  • Making Contracts Computers Can Understand
  • Making Computers Share Secrets Safely
  • Making Money Safe with Computers
  • Making Computers Work Together Nicely
  • Making Computers Keep Secrets Safe
  • Making Computers Work Together Fairly
  • Making Stuff Move Safely with Computers

Quantum Communication

  • Making Computers Talk to Each Other Safely
  • Making Computers Talk to Each Other from Far Away
  • Making Computers Talk to Each Other in Secret
  • Making Money Move Safely with Computers

This list covers a broad spectrum of topics within Information Technology, ranging from foundational concepts to cutting-edge research areas. Feel free to choose any topic that aligns with your interests and expertise for further exploration and study!

Emerging Trends in Information Technology Research

In the rapidly changing world of Computer Studies, keeping up with the latest trends is indispensable. Technology keeps changing, and so does research in computer studies. From awesome things like clever robots to how we can safeguard our online information, computer studies research is always discovering new ways to improve our lives. Therefore, let us delve into some of the most exciting new trends shaping computer studies’ future.

  • Smart Computers:

Right now, smart computers are a hot item. They can learn from experience, recognize patterns, and even understand language like humans do. This helps in many areas, such as healthcare or finance. So researchers are working on making smart computers smarter yet so that they can make decisions alone and be fair to everyone.

  • Fast Computing:

As more devices connect to the Internet, we need ways to process information quickly. Fast computing helps bring processing power closer to where the information comes from, making things quicker and more efficient. Thus, researchers have been figuring out how to improve fast computing, especially for analyzing real-time data.

  • Keeping Things Safe:

With all the cool tech around, keeping our information safe from bad guys is important. We must develop methods to safeguard our data and networks from cyber attackers. In addition, they have also been considering how to ensure the privacy of our personal information so that only authorized individuals can access it.

  • Fancy Computers:

The next big thing in computing is quantum computers. They can do calculations at a high speed that ordinary ones cannot. Researchers are working hard to achieve quantum computing because it could be useful in cracking codes and creating new drugs.

  • New Ways of Doing Things Together:

Blockchain is an exciting technology that allows us to collaborate without a central authority. Its use in cryptocurrencies is quite popular but it has other applications too. Blockchain can be applied for purposes such as helping us discover where products come from, proving who we are on the internet, and making contracts that cannot be changed later on.

  • Virtual Reality Adventures:

Entering a completely different world is what Virtual Reality (VR) and Augmented Reality (AR) do. The feeling of being in reality is what these two technologies create, which is not real. These researchers are working hard on making VRs and ARs better so that they can be used for learning, training, and amusement in more innovative ways.

In summary, computer studies research keeps changing with new trends such as smart computers, rapid computing, cybersecurity issues, high-end computers, collaboration platforms and immersive games or virtual reality escapades. 

By exploring these trends and developing new ideas, researchers ensure that technology keeps improving and making our lives easier and more exciting.

How can I brainstorm research topics in information technology?

Start by identifying your areas of interest and exploring recent advancements in the field. Consider consulting with mentors or peers for suggestions and feedback.

What are some ethical considerations in AI research?

Ethical considerations in AI research include fairness, transparency, accountability, and privacy. Researchers should ensure their algorithms and models do not perpetuate bias or harm individuals.

How can I stay updated on emerging trends in IT research?

Follow reputable journals, conferences, and online forums dedicated to information technology. Engage with the academic community through discussions and networking events.

Similar Articles

How To Do Homework Fast

How To Do Homework Fast – 11 Tips To Do Homework Fast

Homework is one of the most important parts that have to be done by students. It has been around for…

Write assignment introduction

How to Write an Assignment Introduction – 6 Best Tips

In essence, the writing tasks in academic tenure students are an integral part of any curriculum. Whether in high school,…

Leave a Comment Cancel Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed .

Computer Technology Research Paper Topics

Academic Writing Service

This list of computer technology research paper topics  provides the list of 33 potential topics for research papers and an overview article on the history of computer technology.

1. Analog Computers

Paralleling the split between analog and digital computers, in the 1950s the term analog computer was a posteriori projected onto pre-existing classes of mechanical, electrical, and electromechanical computing artifacts, subsuming them under the same category. The concept of analog, like the technical demarcation between analog and digital computer, was absent from the vocabulary of those classifying artifacts for the 1914 Edinburgh Exhibition, the first world’s fair emphasizing computing technology, and this leaves us with an invaluable index of the impressive number of classes of computing artifacts amassed during the few centuries of capitalist modernity. True, from the debate between ‘‘smooth’’ and ‘‘lumpy’’ artificial lines of computing (1910s) to the differentiation between ‘‘continuous’’ and ‘‘cyclic’’ computers (1940s), the subsequent analog–digital split became possible by the multitudinous accumulation of attempts to decontextualize the computer from its socio-historical use alternately to define the ideal computer technically. The fact is, however, that influential classifications of computing technology from the previous decades never provided an encompassing demarcation compared to the analog– digital distinction used since the 1950s. Historians of the digital computer find that the experience of working with software was much closer to art than science, a process that was resistant to mass production; historians of the analog computer find this to have been typical of working with the analog computer throughout all its aspects. The historiography of the progress of digital computing invites us to turn to the software crisis, which perhaps not accidentally, surfaced when the crisis caused by the analog ended. Noticeably, it was not until the process of computing with a digital electronic computer became sufficiently visual by the addition of a special interface—to substitute for the loss of visualization that was previously provided by the analog computer—that the analog computer finally disappeared.

Academic Writing, Editing, Proofreading, And Problem Solving Services

Get 10% off with 24start discount code, 2. artificial intelligence.

Artificial intelligence (AI) is the field of software engineering that builds computer systems and occasionally robots to perform tasks that require intelligence. The term ‘‘artificial intelligence’’ was coined by John McCarthy in 1958, then a graduate student at Princeton, at a summer workshop held at Dartmouth in 1956. This two-month workshop marks the official birth of AI, which brought together young researchers who would nurture the field as it grew over the next several decades: Marvin Minsky, Claude Shannon, Arthur Samuel, Ray Solomonoff, Oliver Selfridge, Allen Newell, and Herbert Simon. It would be difficult to argue that the technologies derived from AI research had a profound effect on our way of life by the beginning of the 21st century. However, AI technologies have been successfully applied in many industrial settings, medicine and health care, and video games. Programming techniques developed in AI research were incorporated into more widespread programming practices, such as high-level programming languages and time-sharing operating systems. While AI did not succeed in constructing a computer which displays the general mental capabilities of a typical human, such as the HAL computer in Arthur C. Clarke and Stanley Kubrick’s film 2001: A Space Odyssey, it has produced programs that perform some apparently intelligent tasks, often at a much greater level of skill and reliability than humans. More than this, AI has provided a powerful and defining image of what computer technology might someday be capable of achieving.

3. Computer and Video Games

Interactive computer and video games were first developed in laboratories as the late-night amusements of computer programmers or independent projects of television engineers. Their formats include computer software; networked, multiplayer games on time-shared systems or servers; arcade consoles; home consoles connected to television sets; and handheld game machines. The first experimental projects grew out of early work in computer graphics, artificial intelligence, television technology, hardware and software interface development, computer-aided education, and microelectronics. Important examples were Willy Higinbotham’s oscilloscope-based ‘‘Tennis for Two’’ at the Brookhaven National Laboratory (1958); ‘‘Spacewar!,’’ by Steve Russell, Alan Kotok, J. Martin Graetz and others at the Massachusetts Institute of Technology (1962); Ralph Baer’s television-based tennis game for Sanders Associates (1966); several networked games from the PLATO (Programmed Logic for Automatic Teaching Operations) Project at the University of Illinois during the early 1970s; and ‘‘Adventure,’’ by Will Crowther of Bolt, Beranek & Newman (1972), extended by Don Woods at Stanford University’s Artificial Intelligence Laboratory (1976). The main lines of development during the 1970s and early 1980s were home video consoles, coin-operated arcade games, and computer software.

4. Computer Displays

The display is an essential part of any general-purpose computer. Its function is to act as an output device to communicate data to humans using the highest bandwidth input system that humans possess—the eyes. Much of the development of computer displays has been about trying to get closer to the limits of human visual perception in terms of color and spatial resolution. Mainframe and minicomputers used ‘‘terminals’’ to display the output. These were fed data from the host computer and processed the data to create screen images using a graphics processor. The display was typically integrated with a keyboard system and some communication hardware as a terminal or video display unit (VDU) following the basic model used for teletypes. Personal computers (PCs) in the late 1970s and early 1980s changed this model by integrating the graphics controller into the computer chassis itself. Early PC displays typically displayed only monochrome text and communicated in character codes such as ASCII. Line-scanning frequencies were typically from 15 to 20 kilohertz—similar to television. CRT displays rapidly developed after the introduction of video graphics array (VGA) technology (640 by 480 pixels in16 colors) in the mid-1980s and scan frequencies rose to 60 kilohertz or more for mainstream displays; 100 kilohertz or more for high-end displays. These displays were capable of displaying formats up to 2048 by 1536 pixels with high color depths. Because the human eye is very quick to respond to visual stimulation, developments in display technology have tended to track the development of semiconductor technology that allows the rapid manipulation of the stored image.

5. Computer Memory for Personal Computers

During the second half of the twentieth century, the two primary methods used for the long-term storage of digital information were magnetic and optical recording. These methods were selected primarily on the basis of cost. Compared to core or transistorized random-access memory (RAM), storage costs for magnetic and optical media were several orders of magnitude cheaper per bit of information and were not volatile; that is, the information did not vanish when electrical power was turned off. However, access to information stored on magnetic and optical recorders was much slower compared to RAM memory. As a result, computer designers used a mix of both types of memory to accomplish computational tasks. Designers of magnetic and optical storage systems have sought meanwhile to increase the speed of access to stored information to increase the overall performance of computer systems, since most digital information is stored magnetically or optically for reasons of cost.

6. Computer Modeling

Computer simulation models have transformed the natural, engineering, and social sciences, becoming crucial tools for disciplines as diverse as ecology, epidemiology, economics, urban planning, aerospace engineering, meteorology, and military operations. Computer models help researchers study systems of extreme complexity, predict the behavior of natural phenomena, and examine the effects of human interventions in natural processes. Engineers use models to design everything from jets and nuclear-waste repositories to diapers and golf clubs. Models enable astrophysicists to simulate supernovas, biochemists to replicate protein folding, geologists to predict volcanic eruptions, and physiologists to identify populations at risk of lead poisoning. Clearly, computer models provide a powerful means of solving problems, both theoretical and applied.

7. Computer Networks

Computers and computer networks have changed the way we do almost everything—the way we teach, learn, do research, access or share information, communicate with each other, and even the way we entertain ourselves. A computer network, in simple terms, consists of two or more computing devices (often called nodes) interconnected by means of some medium capable of transmitting data that allows the computers to communicate with each other in order to provide a variety of services to users.

8. Computer Science

Computer science occupies a unique position among the scientific and technical disciplines. It revolves around a specific artifact—the electronic digital computer—that touches upon a broad and diverse set of fields in its design, operation, and application. As a result, computer science represents a synthesis and extension of many different areas of mathematics, science, engineering, and business.

9. Computer-Aided Control Technology

The story of computer-aided control technology is inextricably entwined with the modern history of automation. Automation in the first half of the twentieth century involved (often analog) processes for continuous automatic measurement and control of hardware by hydraulic, mechanical, or electromechanical means. These processes facilitated the development and refinement of battlefield fire-control systems, feedback amplifiers for use in telephony, electrical grid simulators, numerically controlled milling machines, and dozens of other innovations.

10. Computer-Aided Design and Manufacture

Computer-aided design and manufacture, known by the acronym CAD/CAM, is a process for manufacturing mechanical components, wherein computers are used to link the information needed in and produced by the design process to the information needed to control the machine tools that produce the parts. However, CAD/CAM actually constitutes two separate technologies that developed along similar, but unrelated, lines until they were combined in the 1970s.

11. Computer-User Interface

A computer interface is the point of contact between a person and an electronic computer. Today’s interfaces include a keyboard, mouse, and display screen. Computer user interfaces developed through three distinct stages, which can be identified as batch processing, interactive computing, and the graphical user interface (GUI). Today’s graphical interfaces support additional multimedia features, such as streaming audio and video. In GUI design, every new software feature introduces more icons into the process of computer– user interaction. Presently, the large vocabulary of icons used in GUI design is difficult for users to remember, which creates a complexity problem. As GUIs become more complex, interface designers are adding voice recognition and intelligent agent technologies to make computer user interfaces even easier to operate.

12. Early Computer Memory

Mechanisms to store information were present in early mechanical calculating machines, going back to Charles Babbage’s analytical engine proposed in the 1830s. It introduced the concept of the ‘‘store’’ and, if ever built, would have held 1000 numbers of up to 50 decimal digits. However, the move toward base-2 or binary computing in the 1930s brought about a new paradigm in technology—the digital computer, whose most elementary component was an on–off switch. Information on a digital system is represented using a combination of on and off signals, stored as binary digits (shortened to bits): zeros and ones. Text characters, symbols, or numerical values can all be coded as bits, so that information stored in digital memory is just zeros and ones, regardless of the storage medium. The history of computer memory is closely linked to the history of computers but a distinction should be made between primary (or main) and secondary memory. Computers only need operate on one segment of data at a time, and with memory being a scarce resource, the rest of the data set could be stored in less expensive and more abundant secondary memory.

13. Early Digital Computers

Digital computers were a marked departure from the electrical and mechanical calculating and computing machines in wide use from the early twentieth century. The innovation was of information being represented using only two states (on or off), which came to be known as ‘‘digital.’’ Binary (base 2) arithmetic and logic provided the tools for these machines to perform useful functions. George Boole’s binary system of algebra allowed any mathematical equation to be represented by simply true or false logic statements. By using only two states, engineering was also greatly simplified, and universality and accuracy increased. Further developments from the early purpose-built machines, to ones that were programmable accompanied by many key technological developments, resulted in the well-known success and proliferation of the digital computer.

14. Electronic Control Technology

The advancement of electrical engineering in the twentieth century made a fundamental change in control technology. New electronic devices including vacuum tubes (valves) and transistors were used to replace electromechanical elements in conventional controllers and to develop new types of controllers. In these practices, engineers discovered basic principles of control theory that could be further applied to design electronic control systems.

15. Encryption and Code Breaking

The word cryptography comes from the Greek words for ‘‘hidden’’ (kryptos) and ‘‘to write’’ (graphein)—literally, the science of ‘‘hidden writing.’’ In the twentieth century, cryptography became fundamental to information technology (IT) security generally. Before the invention of the digital computer at mid-century, national governments across the world relied on mechanical and electromechanical cryptanalytic devices to protect their own national secrets and communications, as well as to expose enemy secrets. Code breaking played an important role in both World Wars I and II, and the successful exploits of Polish and British cryptographers and signals intelligence experts in breaking the code of the German Enigma ciphering machine (which had a range of possible transformations between a message and its code of approximately 150 trillion (or 150 million million million) are well documented.

16. Error Checking and Correction

In telecommunications, whether transmission of data or voice signals is over copper, fiber-optic, or wireless links, information coded in the signal transmitted must be decoded by the receiver from a background of noise. Signal errors can be introduced, for example from physical defects in the transmission medium (semiconductor crystal defects, dust or scratches on magnetic memory, bubbles in optical fibers), from electromagnetic interference (natural or manmade) or cosmic rays, or from cross-talk (unwanted coupling) between channels. In digital signal transmission, data is transmitted as ‘‘bits’’ (ones or zeros, corresponding to on or off in electronic circuits). Random bit errors occur singly and in no relation to each other. Burst error is a large, sustained error or loss of data, perhaps caused by transmission problems in the connecting cables, or sudden noise. Analog to digital conversion can also introduce sampling errors.

17. Global Positioning System (GPS)

The NAVSTAR (NAVigation System Timing And Ranging) Global Positioning System (GPS) provides an unlimited number of military and civilian users worldwide with continuous, highly accurate data on their position in four dimensions— latitude, longitude, altitude, and time— through all weather conditions. It includes space, control, and user segments (Figure 6). A constellation of 24 satellites in 10,900 nautical miles, nearly circular orbits—six orbital planes, equally spaced 60 degrees apart, inclined approximately 55 degrees relative to the equator, and each with four equidistant satellites—transmits microwave signals in two different L-band frequencies. From any point on earth, between five and eight satellites are ‘‘visible’’ to the user. Synchronized, extremely precise atomic clocks—rubidium and cesium— aboard the satellites render the constellation semiautonomous by alleviating the need to continuously control the satellites from the ground. The control segment consists of a master facility at Schriever Air Force Base, Colorado, and a global network of automated stations. It passively tracks the entire constellation and, via an S-band uplink, periodically sends updated orbital and clock data to each satellite to ensure that navigation signals received by users remain accurate. Finally, GPS users—on land, at sea, in the air or space—rely on commercially produced receivers to convert satellite signals into position, time, and velocity estimates.

18. Gyrocompass and Inertial Guidance

Before the twentieth century, navigation at sea employed two complementary methods, astronomical and dead reckoning. The former involved direct measurements of celestial phenomena to ascertain position, while the latter required continuous monitoring of a ship’s course, speed, and distance run. New navigational technology was required not only for iron ships in which traditional compasses required correction, but for aircraft and submarines in which magnetic compasses cannot be used. Owing to their rapid motion, aircraft presented challenges for near instantaneous navigation data collection and reduction. Electronics furnished the exploitation of radio and the adaptation of a gyroscope to direction finding through the invention of the nonmagnetic gyrocompass.

Although the Cold War arms race after World War II led to the development of inertial navigation, German manufacture of the V-2 rocket under the direction of Wernher von Braun during the war involved a proto-inertial system, a two-gimballed gyro with an integrator to determine speed. Inertial guidance combines a gyrocompass with accelerometers installed along orthogonal axes, devices that record all accelerations of the vehicle in which inertial guidance has been installed. With this system, if the initial position of the vehicle is known, then the vehicle’s position at any moment is known because integrators record all directions and accelerations and calculate speeds and distance run. Inertial guidance devices can subtract accelerations due to gravity or other motions of the vehicle. Because inertial guidance does not depend on an outside reference, it is the ultimate dead reckoning system, ideal for the nuclear submarines for which they were invented and for ballistic missiles. Their self-contained nature makes them resistant to electronic countermeasures. Inertial systems were first installed in commercial aircraft during the 1960s. The expense of manufacturing inertial guidance mechanisms (and their necessary management by computer) has limited their application largely to military and some commercial purposes. Inertial systems accumulate errors, so their use at sea (except for submarines) has been as an adjunct to other navigational methods, unlike aircraft applications. Only the development of the global positioning system (GPS) at the end of the century promised to render all previous navigational technologies obsolete. Nevertheless, a range of technologies, some dating to the beginning of the century, remain in use in a variety of commercial and leisure applications.

19. Hybrid Computers

Following the emergence of the analog–digital demarcation in the late 1940s—and the ensuing battle between a speedy analog versus the accurate digital—the term ‘‘hybrid computer’’ surfaced in the early 1960s. The assumptions held by the adherents of the digital computer—regarding the dynamic mechanization of computational labor to accompany the equally dynamic increase in computational work—was becoming a universal ideology. From this perspective, the digital computer justly appeared to be technically superior. In introducing the digital computer to social realities, however, extensive interaction with the experienced analog computer adherents proved indispensable, especially given that the digital proponents’ expectation of progress by employing the available and inexpensive hardware was stymied by the lack of inexpensive software. From this perspective—as historiographically unwanted it may be by those who agree with the essentialist conception of the analog–digital demarcation—the history of the hybrid computer suggests that the computer as we now know it was brought about by linking the analog and the digital, not by separating them. Placing the ideal analog and the ideal digital at the two poles, all computing techniques that combined some features of both fell beneath ‘‘hybrid computation’’; the designators ‘‘balanced’’ or ‘‘true’’ were preserved for those built with appreciable amounts of both. True hybrids fell into the middle spectrum that included: pure analog computers, analog computers using digital-type numerical analysis techniques, analog computers programmed with the aid of digital computers, analog computers using digital control and logic, analog computers using digital subunits, analog computers using digital computers as peripheral equipment, balanced hybrid computer systems, digital computers using analog subroutines, digital computers with analog arithmetic elements, digital computers designed to permit analog-type programming, digital computers with analog-oriented compilers and interpreters, and pure digital computers.

20. Information Theory

Information theory, also known originally as the mathematical theory of communication, was first explicitly formulated during the mid-twentieth century. Almost immediately it became a foundation; first, for the more systematic design and utilization of numerous telecommunication and information technologies; and second, for resolving a paradox in thermodynamics. Finally, information theory has contributed to new interpretations of a wide range of biological and cultural phenomena, from organic physiology and genetics to cognitive behavior, human language, economics, and political decision making. Reflecting the symbiosis between theory and practice typical of twentieth century technology, technical issues in early telegraphy and telephony gave rise to a proto-information theory developed by Harry Nyquist at Bell Labs in 1924 and Ralph Hartley, also at Bell Labs, in 1928. This theory in turn contributed to advances in telecommunications, which stimulated the development of information theory per se by Claude Shannon and Warren Weaver, in their book The Mathematical Theory of Communication published in 1949. As articulated by Claude Shannon, a Bell Labs researcher, the technical concept of information is defined by the probability of a specific message or signal being picked out from a number of possibilities and transmitted from A to B. Information in this sense is mathematically quantifiable. The amount of information, I, conveyed by signal, S, is inversely related to its probability, P. That is, the more improbable a message, the more information it contains. To facilitate the mathematical analysis of messages, the measure is conveniently defined as I ¼ log2 1/P(S), and is named a binary digit or ‘‘bit’’ for short. Thus in the simplest case of a two-state signal (1 or 0, corresponding to on or off in electronic circuits), with equal probability for each state, the transmission of either state as the code for a message would convey one bit of information. The theory of information opened up by this conceptual analysis has become the basis for constructing and analyzing digital computational devices and a whole range of information technologies (i.e., technologies including telecommunications and data processing), from telephones to computer networks.

21. Internet

The Internet is a global computer network of networks whose origins are found in U.S. military efforts. In response to Sputnik and the emerging space race, the Advanced Research Projects Agency (ARPA) was formed in 1958 as an agency of the Pentagon. The researchers at ARPA were given a generous mandate to develop innovative technologies such as communications.

In 1962, psychologist J.C.R. Licklider from the Massachusetts Institute of Technology’s Lincoln Laboratory joined ARPA to take charge of the Information Processing Techniques Office (IPTO). In 1963 Licklider wrote a memo proposing an interactive network allowing people to communicate via computer. This project did not materialize. In 1966, Bob Taylor, then head of the IPTO, noted that he needed three different computer terminals to connect to three different machines in different locations around the nation. Taylor also recognized that universities working with IPTO needed more computing resources. Instead of the government buying machines for each university, why not share machines? Taylor revitalized Licklider’s idea, securing $1 million in funding, and hired 29-yearold Larry Roberts to direct the creation of ARPAnet.

In 1974, Robert Kahn and Vincent Cerf proposed the first internet-working protocol, a way for datagrams (packets) to be communicated between disparate networks, and they called it an ‘‘internet.’’ Their efforts created transmission control protocol/internet protocol (TCP/IP). In 1982, TCP/IP replaced NCP on ARPAnet. Other networks adopted TCP/IP and it became the dominant standard for all networking by the late 1990s.

In 1981 the U.S. National Science Foundation (NSF) created Computer Science Network (CSNET) to provide universities that did not have access to ARPAnet with their own network. In 1986, the NSF sponsored the NSFNET ‘‘backbone’’ to connect five supercomputing centers. The backbone also connected ARPAnet and CSNET together, and the idea of a network of networks became firmly entrenched. The open technical architecture of the Internet allowed numerous innovations to be grafted easily onto the whole. When ARPAnet was dismantled in 1990, the Internet was thriving at universities and technology- oriented companies. The NSF backbone was dismantled in 1995 when the NSF realized that commercial entities could keep the Internet running and growing on their own, without government subsidy. Commercial network providers worked through the Commercial Internet Exchange to manage network traffic.

22. Mainframe Computers

The term ‘‘computer’’ currently refers to a general-purpose, digital, electronic, stored-program calculating machine. The term ‘‘mainframe’’ refers to a large, expensive, multiuser computer, able to handle a wide range of applications. The term was derived from the main frame or cabinet in which the central processing unit (CPU) and main memory of a computer were kept separate from those cabinets that held peripheral devices used for input and output.

Computers are generally classified as supercomputers, mainframes, minicomputers, or microcomputers. This classification is based on factors such as processing capability, cost, and applications, with supercomputers the fastest and most expensive. All computers were called mainframes until the 1960s, including the first supercomputer, the naval ordnance research calculator (NORC), offered by International Business Machines (IBM) in 1954. In 1960, Digital Equipment Corporation (DEC) shipped the PDP-1, a computer that was much smaller and cheaper than a mainframe.

Mainframes once each filled a large room, cost millions of dollars, and needed a full maintenance staff, partly in order to repair the damage caused by the heat generated by their vacuum tubes. These machines were characterized by proprietary operating systems and connections through dumb terminals that had no local processing capabilities. As personal computers developed and began to approach mainframes in speed and processing power, however, mainframes have evolved to support a client/server relationship, and to interconnect with open standard-based systems. They have become particularly useful for systems that require reliability, security, and centralized control. Their ability to process large amounts of data quickly make them particularly valuable for storage area networks (SANs). Mainframes today contain multiple CPUs, providing additional speed through multiprocessing operations. They support many hundreds of simultaneously executing programs, as well as numerous input and output processors for multiplexing devices, such as video display terminals and disk drives. Many legacy systems, large applications that have been developed, tested, and used over time, are still running on mainframes.

23. Mineral Prospecting

Twentieth century mineral prospecting draws upon the accumulated knowledge of previous exploration and mining activities, advancing technology, expanding knowledge of geologic processes and deposit models, and mining and processing capabilities to determine where and how to look for minerals of interest. Geologic models have been developed for a wide variety of deposit types; the prospector compares geologic characteristics of potential exploration areas with those of deposit models to determine which areas have similar characteristics and are suitable prospecting locations. Mineral prospecting programs are often team efforts, integrating general and site-specific knowledge of geochemistry, geology, geophysics, and remote sensing to ‘‘discover’’ hidden mineral deposits and ‘‘measure’’ their economic potential with increasing accuracy and reduced environmental disturbance. Once a likely target zone has been identified, multiple exploration tools are used in a coordinated program to characterize the deposit and its economic potential.

24. Packet Switching

Historically the first communications networks were telegraphic—the electrical telegraph replacing the mechanical semaphore stations in the mid-nineteenth century. Telegraph networks were largely eclipsed by the advent of the voice (telephone) network, which first appeared in the late nineteenth century, and provided the immediacy of voice conversation. The Public Switched Telephone Network allows a subscriber to dial a connection to another subscriber, with the connection being a series of telephone lines connected together through switches at the telephone exchanges along the route. This technique is known as circuit switching, as a circuit is set up between the subscribers, and is held until the call is cleared.

One of the disadvantages of circuit switching is the fact that the capacity of the link is often significantly underused due to silences in the conversation, but the spare capacity cannot be shared with other traffic. Another disadvantage is the time it takes to establish the connection before the conversation can begin. One could liken this to sending a railway engine from London to Edinburgh to set the points before returning to pick up the carriages. What is required is a compromise between the immediacy of conversation on an established circuit-switched connection, with the ad hoc delivery of a store-and-forward message system. This is what packet switching is designed to provide.

25. Personal Computers

A personal computer, or PC, is designed for personal use. Its central processing unit (CPU) runs single-user systems and application software, processes input from the user, sending output to a variety of peripheral devices. Programs and data are stored in memory and attached storage devices. Personal computers are generally single-user desktop machines, but the term has been applied to any computer that ‘‘stands alone’’ for a single user, including portable computers.

The technology that enabled the construction of personal computers was the microprocessor, a programmable integrated circuit (or ‘‘chip’’) that acts as the CPU. Intel introduced the first microprocessor in 1971, the 4-bit 4004, which it called a ‘‘microprogrammable computer on a chip.’’ The 4004 was originally developed as a general-purpose chip for a programmable calculator, but Intel introduced it as part of Intel’s Microcomputer System 4-bit, or MCS-4, which also included read-only memory (ROM) and random-access memory (RAM) memory chips and a shift register chip. In August 1972, Intel followed with the 8-bit 8008, then the more powerful 8080 in June 1974. Following Intel’s lead, computers based on the 8080 were usually called microcomputers.

The success of the minicomputer during the 1960s prepared computer engineers and users for ‘‘single person, single CPU’’ computers. Digital Equipment Corporation’s (DEC) widely used PDP-10, for example, was smaller, cheaper, and more accessible than large mainframe computers. Timeshared computers operating under operating systems such as TOPS-10 on the PDP-10— co-developed by the Massachusetts Institute of Technology (MIT) and DEC in 1972—created the illusion of individual control of computing power by providing rapid access to personal programs and files. By the early 1970s, the accessibility of minicomputers, advances in microelectronics, and component miniaturization created expectations of affordable personal computers.

26. Printers

Printers generally can be categorized as either impact or nonimpact. Like typewriters, impact printers generate output by striking the page with a solid substance. Impact printers include daisy wheel and dot matrix printers. The daisy wheel printer, which was introduced in 1972 by Diablo Systems, operates by spinning the daisy wheel to the correct character whereupon a hammer strikes it, forcing the character through an inked ribbon and onto the paper. Dot matrix printers operate by using a series of small pins to strike a matrix or grid ribbon coated with ink. The strike of the pin forces the ink to transfer to the paper at the point of impact. Unlike daisy wheel printers, dot matrix printers can generate italic and other character types through producing different pin patterns. Nonimpact printers generate images by spraying or fusing ink to paper or other output media. This category includes inkjet printers, laser printers, and thermal printers. Whether they are inkjet or laser, impact or nonimpact, all modern printers incorporate features of dot matrix technology in their design: they operate by generating dots onto paper or other physical media.

27. Processors for Computers

A processor is the part of the computer system that manipulates the data. The first computer processors of the late 1940s and early 1950s performed three main functions and had three main components. They worked in a cycle to gather, decode, and execute instructions. They were made up of the arithmetic and logic unit, the control unit, and some extra storage components or registers. Today, most processors contain these components and perform these same functions, but since the 1960s they have developed different forms, capabilities, and organization. As with computers in general, increasing speed and decreasing size has marked their development.

28. Radionavigation

Astronomical and dead-reckoning techniques furnished the methods of navigating ships until the twentieth century, when exploitation of radio waves, coupled with electronics, met the needs of aircraft with their fast speeds, but also transformed all navigational techniques. The application of radio to dead reckoning has allowed vessels to determine their positions in all-weather by direction finding (known as radio direction finding, or RDF) or by hyperbolic systems. Another use of radio, radar (radio direction and rangefinding), enables vessels to determine their distance to, or their bearing from, objects of known position. Radionavigation complements traditional navigational methods by employing three frames of reference. First, radio enables a vessel to navigate by lines of bearing to shore transmitters (the most common use of radio). This is directly analogous to the use of lighthouses for bearings. Second, shore stations may take radio bearings of craft and relay to them computed positions. Third, radio beacons provide aircraft or ships with signals that function as true compasses.

29. Software Application Programs

At the beginning of the computer age around the late 1940s, inventors of the intelligent machine were not thinking about applications software, or any software other than that needed to run the bare machine to do mathematical calculating. It was only when Maurice Wilkes’ young protégé David Williams crafted a tidy set of initial orders for the EDSAC, an early programmable digital computer, that users could string together standard subroutines to a program and have the execution jump between them. This was the beginning of software as we know it—something that runs on a machine other than an operating system to make it do anything desired. ‘‘Applications’’ are software other than system programs that run the actual hardware. Manufacturers always had this software, and as the 1950s progressed they would ‘‘bundle’’ applications with hardware to make expensive computers more attractive. Some programming departments were even placed in the marketing departments.

30. Software Engineering

Software engineering aims to develop the programs that allow digital computers to do useful work in a systematic, disciplined manner that produces high-quality software on time and on budget. As computers have spread throughout industrialized societies, software has become a multibillion dollar industry. Both the users and developers of software depend a great deal on the effectiveness of the development process.

Software is a concept that didn’t even pertain to the first electronic digital computers. They were ‘‘programmed’’ through switches and patch cables that physically altered the electrical pathways of the machine. It was not until the Manchester Mark I, the first operational stored-program electronic digital computer, was developed in 1948 at the University of Manchester in England that configuring the machine to solve a specific problem became a matter of software rather than hardware. Subsequently, instructions were stored in memory along with data.

31. Supercomputers

Supercomputers are high-performance computing devices that are generally used for numerical calculation, for the study of physical systems either through numerical simulation or the processing of scientific data. Initially, they were large, expensive, mainframe computers, which were usually owned by government research labs. By the end of the twentieth century, they were more often networks of inexpensive small computers. The common element of all of these machines was their ability to perform high-speed floating-point arithmetic— binary arithmetic that approximates decimal numbers with a fixed number of bits—the basis of numerical computation.

With the advent of inexpensive supercomputers, these machines moved beyond the large government labs and into smaller research and engineering facilities. Some were used for the study of social science. A few were employed by business concerns, such as stock brokerages or graphic designers.

32. Systems Programs

The operating systems used in all computers today are a result of the development and organization of early systems programs designed to control and regulate the operations of computer hardware. The early computing machines such as the ENIAC of 1945 were ‘‘programmed’’ manually with connecting cables and setting switches for each new calculation. With the advent of the stored program computer of the late 1940s (the Manchester Mark I, EDVAC, EDSAC (electronic delay storage automatic calculator), the first system programs such as assemblers and compilers were developed and installed. These programs performed oft repeated and basic operations for computer use including converting programs into machine code, storing and retrieving files, managing computer resources and peripherals, and aiding in the compilation of new programs. With the advent of programming languages, and the dissemination of more computers in research centers, universities, and businesses during the late 1950s and 1960s, a large group of users began developing programs, improving usability, and organizing system programs into operating systems.

The 1970s and 1980s saw a turn away from some of the complications of system software, an interweaving of features from different operating systems, and the development of systems programs for the personal computer. In the early 1970s, two programmers from Bell Laboratories, Ken Thompson and Dennis Ritchie, developed a smaller, simpler operating system called UNIX. Unlike past system software, UNIX was portable and could be run on different computer systems. Due in part to low licensing fees and simplicity of design, UNIX increased in popularity throughout the 1970s. At the Xerox Palo Alto Research Center, research during the 1970s led to the development of system software for the Apple Macintosh computer that included a GUI (graphical user interface). This type of system software filtered the user’s interaction with the computer through the use of graphics or icons representing computer processes. In 1985, a year after the release of the Apple Macintosh computer, a GUI was overlaid on Microsoft’s then dominant operating system, MS-DOS, to produce Microsoft Windows. The Microsoft Windows series of operating systems became and remains the dominant operating system on personal computers.

33. World Wide Web

The World Wide Web (Web) is a ‘‘finite but unbounded’’ collection of media-rich digital resources that are connected through high-speed digital networks. It relies upon an Internet protocol suite that supports cross-platform transmission and makes available a wide variety of media types (i.e., multimedia). The cross-platform delivery environment represents an important departure from more traditional network communications protocols such as e-mail, telnet, and file transfer protocols (FTP) because it is content-centric. It is also to be distinguished from earlier document acquisition systems such as Gopher, which was designed in 1991, originally as a mainframe program but quickly implemented over networks, and wide area information systems (WAIS), also released in 1991. WAIS accommodated a narrower range of media formats and failed to include hyperlinks within their navigation protocols. Following the success of Gopher on the Internet, the Web quickly extended and enriched the metaphor of integrated browsing and navigation. This made it possible to navigate and peruse a wide variety of media types effortlessly on the Web, which in turn led to the Web’s hegemony as an Internet protocol.

History of Computer Technology

Computer Technology

The modern computer—the (electronic) digital computer in which the stored program concept is realized and hence self-modifying programs are possible—was only invented in the 1940s. Nevertheless, the history of computing (interpreted as the usage of modern computers) is only understandable against the background of the many forms of information processing as well as mechanical computing devices that solved mathematical problems in the first half of the twentieth century. The part these several predecessors played in the invention and early history of the computer may be interpreted from two different perspectives: on the one hand it can be argued that these machines prepared the way for the modern digital computer, on the other hand it can be argued that the computer, which was invented as a mathematical instrument, was reconstructed to be a data-processing machine, a control mechanism, and a communication tool.

The invention and early history of the digital computer has its roots in two different kinds of developments: first, information processing in business and government bureaucracies; and second, the use and the search for mathematical instruments and methods that could solve mathematical problems arising in the sciences and in engineering.

Origins in Mechanical Office Equipment

The development of information processing in business and government bureaucracies had its origins in the late nineteenth century, which was not just an era of industrialization and mass production but also a time of continuous growth in administrative work. The economic precondition for this development was the creation of a global economy, which caused growth in production of goods and trade. This brought with it an immense increase in correspondence, as well as monitoring and accounting activities—corporate bureaucracies began to collect and process data in increasing quantities. Almost at the same time, government organizations became more and more interested in collating data on population and demographic changes (e.g., expanding tax revenues, social security, and wide-ranging planning and monitoring functions) and analyzing this data statistically.

Bureaucracies in the U.S. and in Europe reacted in a different way to these changes. While in Europe for the most part neither office machines nor telephones entered offices until 1900, in the U.S. in the last quarter of the nineteenth century the information-handling techniques in bureaucracies were radically changed because of the introduction of mechanical devices for writing, copying, and counting data. The rise of big business in the U.S. had caused a growing demand for management control tools, which was fulfilled by a new ideology of systematic management together with the products of the rising office machines industry. Because of a later start in industrialization, the government and businesses in the U.S. were not forced to reorganize their bureaucracies when they introduced office machines. This, together with an ideological preference for modern office equipment, was the cause of a market for office machines and of a far-reaching mechanization of office work in the U.S. In the 1880s typewriters and cash registers became very widespread, followed by adding machines and book-keeping machines in the 1890s. From 1880 onward, the makers of office machines in the U.S. underwent a period of enormous growth, and in 1920 the office machine industry annually generated about $200 million in revenue. In Europe, by comparison, mechanization of office work emerged about two decades later than in the U.S.—both Germany and Britain adopted the American system of office organization and extensive use of office machines for the most part no earlier than the 1920s.

During the same period the rise of a new office machine technology began. Punched card systems, initially invented by Herman Hollerith to analyze the U.S. census in 1890, were introduced. By 1911 Hollerith’s company had only about 100 customers, but after it had been merged in the same year with two other companies to become the Computing- Tabulating-Recording Company (CTR), it began a tremendous ascent to become the world leader in the office machine industry. CTR’s general manager, Thomas J. Watson, understood the extraordinary potential of these punched-card accounting devices, which enabled their users to process enormous amounts of data largely automatically, in a rapid way and at an adequate level of cost and effort. Due to Watson’s insights and his extraordinary management abilities, the company (which had since been renamed to International Business Machines (IBM)) became the fourth largest office machine supplier in the world by 1928—topped only by Remington Rand, National Cash Register (NCR), and the Burroughs Adding Machine Company.

Origin of Calculating Devices and Analog Instruments

Compared with the fundamental changes in the world of corporate and government bureaucracies caused by office machinery during the late nineteenth and early twentieth century, calculating machines and instruments seemed to have only a minor influence in the world of science and engineering. Scientists and engineers had always been confronted with mathematical problems and had over the centuries developed techniques such as mathematical tables. However, many new mathematical instruments emerged in the nineteenth century and increasingly began to change the world of science and engineering. Apart from the slide rule, which came into popular use in Europe from the early nineteenth century onwards (and became the symbol of the engineer for decades), calculating machines and instruments were only produced on a large scale in the middle of the nineteenth century.

In the 1850s the production of calculating machines as well as that of planimeters (used to measure the area of closed curves, a typical problem in land surveying) started on different scales. Worldwide, less than 2,000 calculating machines were produced before 1880, but more than 10,000 planimeters were produced by the early 1880s. Also, various types of specialized mathematical analog instruments were produced on a very small scale in the late nineteenth century; among them were integraphs for the graphical solution of special types of differential equations, harmonic analyzers for the determination of Fourier coefficients of a periodic function, and tide predictors that could calculate the time and height of the ebb and flood tides.

Nonetheless, in 1900 only geodesists and astronomers (as well as part of the engineering community) made extensive use of mathematical instruments. In addition, the establishment of applied mathematics as a new discipline took place at German universities on a small scale and the use of apparatus and machines as well as graphical and numerical methods began to flourish during this time. After World War I, the development of engineering sciences and of technical physics gave a tremendous boost to applied mathematics in Germany and Britain. In general, scientists and engineers became more aware of the capabilities of calculating machines and a change of the calculating culture—from the use of tables to the use of calculating machines—took place.

One particular problem that was increasingly encountered by mechanical and electrical engineers in the 1920s was the solution of several types of differential equations, which were not solvable by analytic solutions. As one important result of this development, a new type of analog instrument— the so called ‘‘differential analyzer’’—was invented in 1931 by the engineer Vannevar Bush at the Massachusetts Institute of Technology (MIT). In contrast to its predecessors—several types of integraphs—this machine (which was later called an analog computer) could be used not only to solve a special class of differential equation, but a more general class of differential equations associated with engineering problems. Before the digital computer was invented in the 1940s there was an intensive use of analog instruments (similar to Bush’s differential analyzer) and a number of machines were constructed in the U.S. and in Europe after the model of Bush’s machine before and during World War II. Analog instruments also became increasingly important in several fields such as the firing control of artillery on warships or the control of rockets. It is worth mentioning here that only for a limited class of scientific and engineering problems was it possible to construct an analog computer— weather forecasting and the problem of shock waves produced by an atomic bomb, for example, required the solution of partial differential equations, for which a digital computer was needed.

The Invention of the Computer

The invention of the electronic digital stored-program computer is directly connected with the development of numerical calculation tools for the solution of mathematical problems in the sciences and in engineering. The ideas that led to the invention of the computer were developed simultaneously by scientists and engineers in Germany, Britain, and the U.S. in the 1930s and 1940s. The first freely programmable program-controlled automatic calculator was developed by the civil engineering student Konrad Zuse in Germany. Zuse started development work on program-controlled computing machines in the 1930s, when he had to deal with extensive calculations in static, and in 1941 his Z3, which was based on electromechanical relay technology, became operational.

Several similar developments in the U.S. were in progress at the same time. In 1937 Howard Aiken, a physics student at Harvard University, approached IBM to build a program-controlled calculator— later called the ‘‘Harvard Mark I.’’ On the basis of a concept Aiken had developed because of his experiences with the numerical solution of partial differential equations, the machine was built and became operational in 1944. At almost the same time a series of important relay computers was built at the Bell Laboratories in New York following a suggestion by George R. Stibitz. All these developments in the U.S. were spurred by the outbreak of World War II. The first large-scale programmable electronic computer called the Colossus was built in complete secrecy in 1943 to 1944 at Bletchley Park in Britain in order to help break the German Enigma machine ciphers.

However, it was neither these relay calculators nor the Colossus that were decisive for the development of the universal computer, but the ENIAC (electronic numerical integrator and computer), which was developed at the Moore School of Engineering at the University of Pennsylvania. Extensive ballistic calculations were carried out there for the U.S. Army during World War II with the aid of the Bush ‘‘differential analyzer’’ and more than a hundred women (‘‘computors’’) working on mechanical desk calculators. Observing that capacity was barely sufficient to compute the artillery firing tables, the physicist John W. Mauchly and the electronic engineer John Presper Eckert started developing the ENIAC, a digital version of the differential analyzer, in 1943 with funding from the U.S. Army.

In 1944 the mathematician John von Neumann turned his attention to the ENIAC because of his mathematical work on the Manhattan Project (on the implosion of the hydrogen bomb). While the ENIAC was being built, Neumann and the ENIAC team drew up plans for a successor to the ENIAC in order to improve the shortcomings of the ENIAC concept, such as the very small memory and the time-consuming reprogramming (actually rewiring) required to change the setup for a new calculation. In these meetings the idea of a stored-program, universal machine evolved. Memory was to be used to store the program in addition to data. This would enable the machine to execute conditional branches and change the flow of the program. The concept of a computer in the modern sense of the word was born and in 1945 von Neumann wrote the important ‘‘First Draft of a Report on the EDVAC,’’ which described the stored-program, universal computer. The logical structure that was presented in this draft report is now referred to as the ‘‘von Neumann architecture.’’ This EDVAC report was originally intended for internal use but once made freely available it became the ‘‘bible’’ for computer pioneers throughout the world in the 1940s and 1950s. The first computer featuring the von Neumann architecture operated at Cambridge University in the U.K.; in June 1949 the EDSAC (electronic delay storage automatic computer) computer built by Maurice Wilkes—designed according to the EDVAC principles—became operational.

The Computer as a Scientific Instrument

As soon as the computer was invented, a growing demand for computers by scientists and engineers evolved, and numerous American and European universities started their own computer projects in the 1940s and 1950s. After the technical difficulties of building an electronic computer were solved, scientists grasped the opportunity to use the new scientific instrument for their research. For example, at the University of Gottingen in Germany, the early computers were used for the initial value problems of partial differential equations associated with hydrodynamic problems from atomic physics and aerodynamics. Another striking example was the application of von Neumann’s computer at the Institute for Advanced Study (IAS) in Princeton to numerical weather forecasts in 1950. As a result, numerical weather forecasts could be made on a regular basis from the mid-1950s onwards.

Mathematical methods have always been of a certain importance for science and engineering sciences, but only the use of the electronic digital computer (as an enabling technology) made it possible to broaden the application of mathematical methods to such a degree that research in science, medicine, and engineering without computer- based mathematical methods has become virtually inconceivable at the end of the twentieth century. A number of additional computer-based techniques, such as scientific visualization, medical imaging, computerized tomography, pattern recognition, image processing, and statistical applications, have become of the utmost significance for science, medicine, engineering, and social sciences. In addition, the computer changed the way engineers construct technical artifacts fundamentally because of the use of computer-based methods such as computer-aided design (CAD), computer-aided manufacture (CAM), computer-aided engineering, control applications, and finite-element methods. However, the most striking example seems to be the development of scientific computing and computer modeling, which became accepted as a third mode of scientific research that complements experimentation and theoretical analysis. Scientific computing and computer modeling are based on supercomputers as the enabling technology, which became important tools for modern science routinely used to simulate physical and chemical phenomena. These high-speed computers became equated with the machines developed by Seymour Cray, who built the fastest computers in the world for many years. The supercomputers he launched such as the legendary CRAY I from 1976 were the basis for computer modeling of real world systems, and helped, for example, the defense industry in the U.S. to build weapons systems and the oil industry to create geological models that show potential oil deposits.

Growth of Digital Computers in Business and Information Processing

When the digital computer was invented as a mathematical instrument in the 1940s, it could not have been foreseen that this new artifact would ever be of a certain importance in the business world. About 50 firms entered the computer business worldwide in the late 1940s and the early 1950s, and the computer was reconstructed to be a type of electronic data-processing machine that took the place of punched-card technology as well as other office machine technology. It is interesting to consider that there were mainly three types of companies building computers in the 1950s and 1960s: newly created computer firms (such as the company founded by the ENIAC inventors Eckert and Mauchly), electronics and control equipments firms (such as RCA and General Electric), and office appliance companies (such as Burroughs and NCR). Despite the fact that the first digital computers were put on the market by a German and a British company, U.S. firms dominated the world market from the 1950s onward, as these firms had the biggest market as well as financial support from the government.

Generally speaking, the Cold War exerted an enormous influence on the development of computer technology. Until the early 1960s the U.S. military and the defense industry were the central drivers of the digital computer expansion, serving as the main market for computer technology and shaping and speeding up the formation of the rising computer industry. Because of the U.S. military’s role as the ‘‘tester’’ for prototype hard- and software, it had a direct and lasting influence on technological developments; in addition, it has to be noted that the spread of computer technology was partly hindered by military secrecy. Even after the emergence of a large civilian computer market in the 1960s, the U.S. military maintained its influence by investing a great deal in computer in hard- and software and in computer research projects.

From the middle of the 1950s onwards the world computer market was dominated by IBM, which accounted for more than 70 percent of the computer industry revenues until the mid-1970s. The reasons for IBM’s overwhelming success were diverse, but the company had a unique combination of technical and organizational capabilities at its disposal that prepared it perfectly for the mainframe computer market. In addition, IBM benefited from enormous government contracts, which helped to develop excellence in computer technology and design. However, the greatest advantage of IBM was by no doubt its marketing organization and its reputation as a service-oriented firm, which was used to working closely with customers to adapt machinery to address specific problems, and this key difference between IBM and its competitors persisted right into the computer age.

During the late 1950s and early 1960s, the computer market—consisting of IBM and seven other companies called the ‘‘seven dwarves’’—was dominated by IBM, with its 650 and 1401 computers. By 1960 the market for computers was still small. Only about 7,000 computers had been delivered by the computer industry, and at this time even IBM was primarily a punched-card machine supplier, which was still the major source of its income. Only in 1960 did a boom in demand for computers start, and by 1970 the number of computers installed worldwide had increased to more than 100,000. The computer industry was on the track to become one of the world’s major industries, and was totally dominated by IBM.

The outstanding computer system of this period was IBM’s System/360. It was announced in 1964 as a compatible family of the same computer architecture, and employed interchangeable peripheral devices in order to solve IBM’s problems with a hotchpotch of incompatible product lines (which had evoked large problems in the development and maintenance of a great deal of different hardware and software products). Despite the fact that neither the technology used nor the systems programming were of a high-tech technology at the time, the System/360 established a new standard for mainframe computers for decades. Various computer firms in the U.S., Europe, Japan and even Russia, concentrated on copying components, peripherals for System/360 or tried to build System/360-compatible computers.

The growth of the computer market during the 1960s was accompanied by market shakeouts: two of the ‘‘seven dwarves’’ left the computer business after the first computer recession in the early 1970s, and afterwards the computer market was controlled by IBM and BUNCH (Burroughs, UNIVAC, NCR, Control Data, and Honeywell). At the same time, an internationalization of the computer market took place—U.S. companies controlled the world market for computers— which caused considerable fears over loss of national independence in European and Japanese national governments, and these subsequently stirred up national computing programs. While the European attempts to create national champions as well as the more general attempt to create a European-wide market for mainframe computers failed in the end, Japan’s attempt to found a national computer industry has been successful: Until today Japan is the only nation able to compete with the U.S. in a wide array of high-tech computer-related products.

Real-Time and Time-Sharing

Until the 1960s almost all computers in government and business were running batch-processing applications (i.e., the computers were only used in the same way as the punched-card accounting machines they had replaced). In the early 1950s, however, the computer industry introduced a new mode of computing named ‘‘real-time’’ in the business sector for the first time, which was originally developed for military purposes in MIT’s Whirlwind project. This project was initially started in World War II with the aim of designing an aircraft simulator by analog methods, and later became a part of a research and development program for the gigantic, computerized anti-aircraft defense system SAGE (semi-automatic ground environment) built up by IBM in the 1950s.

The demand for this new mode of computing was created by cultural and structural changes in economy. The increasing number of financial transactions in banks and insurance companies as well as increasing airline traveling activities made necessary new computer-based information systems that led finally to new forms of business evolution through information technology.

The case of the first computerized airline reservation system SABRE, developed for American Airlines by IBM in the 1950s and finally implemented in the early 1960s, serves to thoroughly illustrate these structural and structural changes in economy. Until the early 1950s, airline reservations had been made manually without any problems, but by 1953 this system was in crisis because increased air traffic and growing flight plan complexity had made reservation costs insupportable. SABRE became a complete success, demonstrating the potential of centralized real-time computing systems connected via a network. The system enabled flight agents throughout the U.S., who were equipped with desktop terminals, to gain a direct, real-time access to the central reservation system based on central IBM mainframe computers, while the airline was able to assign appropriate resources in response. Therefore, an effective combination of advantages was offered by SABRE—a better utilization of resources and a much higher customer convenience.

Very soon this new mode of computing spread around the business and government world and became commonplace throughout the service and distribution sectors of the economy; for example, bank tellers and insurance account representatives increasingly worked at terminals. On the one hand structural information problems led managers to go this way, and on the other hand the increasing use of computers as information handling machines in government and business had brought about the idea of computer-based accessible data retrieval. In the end, more and more IBM customers wanted to link dozens of operators directly to central computers by using terminal keyboards and display screens.

In the late 1950s and early 1960s—at the same time that IBM and American Airlines had begun the development of the SABRE airline reservation system—a group of brilliant computer scientists had a new idea for computer usage named ‘‘time sharing.’’ Instead of dedicating a multi-terminal system solely to a single application, they had the computer utility vision of organizing a mainframe computer so that several users could interact with it simultaneously. This vision was to change the nature of computing profoundly, because computing was no longer provided to naive users by programmers and systems analysts, and by the late 1960s time-sharing computers became widespread in the U.S.

Particularly important for this development had been the work of J.C.R. Licklider of the Advanced Research Project Agency (ARPA) of the U.S. Department of Defense. In 1960 Licklider had published a now-classic paper ‘‘Man–Computer Symbiosis’’ proposing the use of computers to augment human intellect and creating the vision of interactive computing. Licklider was very successful in translating his idea of a network allowing people on different computers to communicate into action, and convinced ARPA to start an enormous research program in 1962. Its budget surpassed that of all other sources of U.S. public research funding for computers combined. The ARPA research programs resulted in a series of fundamental moves forward in computer technology in areas such as computer graphics, artificial intelligence, and operating systems. For example, even the most influential current operating system, the general-purpose time-sharing system Unix, developed in the early 1970s at the Bell Laboratories, was a spin-off of an ambitious operating system project, Multics, funded by ARPA. The designers of Unix successfully attempted to keep away from complexity by using a clear, minimalist design approach to software design, and created a multitasking, multiuser operating system, which became the standard operating system in the 1980s.

Electronic Component Revolution

While the nature of business computing was changed by the new paradigms such as real time and time sharing, advances in solid-state components increasingly became a driving force for fundamental changes in the computer industry, and led to a dynamic interplay between new computer designs and new programming techniques that resulted in a remarkable series of technical developments. The technical progress of the mainframe computer had always run parallel to conversions in the electronics components. During the period from 1945 to 1965, two fundamental transformations in the electronics industry took place that were marked by the invention of the transistor in 1947 and the integrated circuit in 1957 to 1958. While the first generation of computers—lasting until about 1960—was characterized by vacuum tubes (valves) for switching elements, the second generation used the much smaller and more reliable transistors, which could be produced at a lower price. A new phase was inaugurated when an entire integrated circuit on a chip of silicon was produced in 1961, and when the first integrated circuits were produced for the military in 1962. A remarkable pace of progress in semiconductor innovations, known as the ‘‘revolution in miniature,’’ began to speed up the computer industry. The third generation of computers characterized by the use of integrated circuits began with the announcement of the IBM System/360 in 1964 (although this computer system did not use true integrated circuits). The most important effect of the introduction of integrated circuits was not to strengthen the leading mainframe computer systems, but to destroy Grosch’s Law, which stated that computing power increases as the square of its costs. In fact, the cost of computer power dramatically reduced during the next ten years.

This became clear with the introduction of the first computer to use integrated circuits on a full scale in 1965: the Digital Equipment Corporation (DEC) offered its PDP-8 computer for just $18,000, creating a new class of computers called minicomputers—small in size and low in cost—as well as opening up the market to new customers. Minicomputers were mainly used in areas other than general-purpose computing such as industrial applications and interactive graphics systems. The PDP-8 became the first widely successful minicomputer with over 50,000 items sold, demonstrating that there was a market for smaller computers. This success of DEC (by 1970 it had become the world’s third largest computer manufacturer) was supported by dramatic advances in solid-state technology. During the 1960s the number of transistors on a chip doubled every two years, and as a result minicomputers became continuously more powerful and more inexpensive at an inconceivable speed.

Personal Computing

The most striking aspect of the consequences of the exponential increase of the number of transistors on a chip during the 1960s—as stated by ‘‘Moore’s Law’’: the number of transistors on a chip doubled every two years—was not the lowering of the costs of mainframe computer and minicomputer processing and storage, but the introduction of the first consumer products based on chip technology such as hand-held calculators and digital watches in about 1970. More specifically, the market acts in these industries were changed overnight by the shift from mechanical to chip technology, which led to an enormous deterioration in prices as well as a dramatic industry shakeout. These episodes only marked the beginning of wide-ranging changes in economy and society during the last quarter of the twentieth century leading to a new situation where chips played an essential role in almost every part of business and modern life.

The case of the invention of the personal computer serves to illustrate that it was not sufficient to develop the microprocessor as the enabling technology in order to create a new invention, but how much new technologies can be socially constructed by cultural factors and commercial interests. When the microprocessor, a single-chip integrated circuit implementation of a CPU, was launched by the semiconductor company Intel in 1971, there was no hindrance to producing a reasonably priced microcomputer, but it took six years until the consumer product PC emerged. None of the traditional mainframe and minicomputer companies were involved in creating the early personal computer. Instead, a group of computer hobbyists as well as the ‘‘computer liberation’’ movement in the U.S. became the driving force behind the invention of the PC. These two groups were desperately keen on a low-priced type of minicomputer for use at home for leisure activities such as computer games; or rather they had the counterculture vision of an unreservedly available and personal access to an inexpensive computer utility provided with rich information. When in 1975 the Altair 8800, an Intel 8080 microprocessor-based computer, was offered as an electronic hobbyist kit for less than $400, these two groups began to realize their vision of a ‘‘personal computer.’’ Very soon dozens of computer clubs and computer magazines were founded around the U.S., and these computer enthusiasts created the personal computer by combining the Altair with keyboards, disk drives, and monitors as well as by developing standard software for it. Consequently, in only two years, a more or less useless hobbyist kit had been changed into a computer that could easily be transformed in a consumer product.

The computer hobbyist period ended in 1977, when the first standard machines for an emerging consumer product mass market were sold. These included products such as the Commodore Pet and the Apple II, which included its own monitor, disk drive, and keyboard, and was provided with several basic software packages. Over next three years, spreadsheet, word processing, and database software were developed, and an immense market for games software evolved. As a result, personal computers became more and more a consumer product for ordinary people, and Apple’s revenues shot to more than $500 million in 1982. By 1980, the personal computer had transformed into a business machine, and IBM decided to develop its own personal computer, which was introduced as the IBM PC in 1981. It became an overwhelming success and set a new industry standard.

Apple tried to compete by launching their new Macintosh computer in 1984 provided with a revolutionary graphical user interface (GUI), which set a new standard for a user-friendly human–computer interaction. It was based on technology created by computer scientists at the Xerox Palo Alto Research Center in California, who had picked up on ideas about human– computer interaction developed at the Stanford Research Institute and at the University of Utah. Despite the fact that the Macintosh’s GUI was far superior to the MS-DOS operating system of the IBM-compatible PCs, Apple failed to win the business market and remained a niche player with a market share of about 10 percent. The PC main branch was determined by the companies IBM had chosen as its original suppliers in 1981 for the design of the microprocessor (Intel) and the operating system (Microsoft). While IBM failed to seize power in the operating system software market for PCs in a software war with Microsoft, Microsoft achieved dominance not only of the key market for PC operating systems, but also the key market of office applications during the first half of the 1990s.

In the early 1990s computing again underwent further fundamental changes with the appearance of the Internet, and for the most computer users, networking became an integral part of what it means to have a computer. Furthermore, the rise of the Internet indicated the impending arrival of a new ‘‘information infrastructure’’ as well as of a ‘‘digital convergence,’’ as the coupling of computers and communications networks was often called.

In addition, the 1990s were a period of an information technology boom, which was mainly based on the Internet hype. For many years previously, it seemed to a great deal of managers and journalists that the Internet would become not just an indispensable business tool, but also a miracle cure for economic growth and prosperity. In addition, computer scientists and sociologists started a discussion predicting the beginning of a new ‘‘information age’’ based on the Internet as a ‘‘technological revolution’’ and reshaping the ‘‘material basis’’ of industrial societies.

The Internet was the outcome of an unusual collaboration of a military–industrial–academic complex that promoted the development of this extraordinary innovation. It grew out of a military network called the ARPAnet, a project established and funded by ARPA in the 1960s. The ARPAnet was initially devoted to support of data communications for defense research projects and was only used by a small number of researchers in the 1970s. Its further development was primarily promoted by unintentional forms of network usage. The users of the ARPAnet became very much attracted by the opportunity for communicating through electronic mail, which rapidly surpassed all other forms of network activities. Another unplanned spin-off of the ARPAnet was the Usenet (Unix User Network), which started in 1979 as a link between two universities and enabled its users to subscribe to newsgroups. Electronic mail became a driving force for the creation of a large number of new proprietary networks funded by the existing computer services industry or by organizations such as the NSF (NSFnet). Because networks users’ desire for email to be able to cross network boundaries, an ARPA project on ‘‘internetworking’’ became the origin for the ‘‘Internet’’—a network of networks linked by several layers of protocols such as TCP/IP (transmission control protocol/internet protocol), which quickly developed into the actual standard.

Only after the government funding had solved many of the most essential technical issues and had shaped a number of the most characteristic features of the Internet, did private sector entrepreneurs start Internet-related ventures and quickly developed user-oriented enhancements. Nevertheless, the Internet did not make a promising start and it took more than ten years before significant numbers of networks were connected. In 1980, the Internet had less than two hundred hosts, and during the next four years the number of hosts went up only to 1000. Only when the Internet reached the educational and business community of PC users in the late 1980s, did it start to become an important economic and social phenomenon. The number of hosts began an explosive growth in the late 1980s—by 1988 there were over 50,000 hosts. An important and unforeseen side effect of this development became the creation of the Internet into a new electronic publishing medium. The electronic publishing development that excited most interest in the Internet was the World Wide Web, originally developed at the CERN High Energy Physics Laboratory in Geneva in 1989. Soon there were millions of documents on the Internet, and private PC users became excited by the joys of surfing the Internet. A number of firms such as AOL soon provided low-cost network access and a range of consumer-oriented information services. The Internet boom was also helped by the Clinton–Gore presidential election campaign on the ‘‘information superhighway’’ and by the amazing news reporting on the national information infrastructure in the early 1990s. Nevertheless, for many observers it was astounding how fast the number of hosts on the Internet increased during the next few years—from more than 1 million in 1992 to 72 million in 1999.

The overwhelming success of the PC and of the Internet tends to hide the fact that its arrival marked only a branching in computer history and not a sequence. (Take, for example, the case of mainframe computers, which still continue to run, being of great importance to government facilities and the private sector (such as banks and insurance companies), or the case of supercomputers, being of the utmost significance for modern science and engineering.) Furthermore, it should be noted that only a small part of the computer applications performed today is easily observable—98 percent of programmable CPUs are used in embedded systems such as automobiles, medical devices, washing machines and mobile telephones.

Browse other Technology Research Paper Topics .

ORDER HIGH QUALITY CUSTOM PAPER

computer information systems research paper topics

Grad Coach

Research Topics & Ideas: CompSci & IT

50+ Computer Science Research Topic Ideas To Fast-Track Your Project

IT & Computer Science Research Topics

Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you’ve landed on this post, chances are you’re looking for a computer science-related research topic , but aren’t sure where to start. Here, we’ll explore a variety of CompSci & IT-related research ideas and topic thought-starters, including algorithms, AI, networking, database systems, UX, information security and software engineering.

NB – This is just the start…

The topic ideation and evaluation process has multiple steps . In this post, we’ll kickstart the process by sharing some research topic ideas within the CompSci domain. This is the starting point, but to develop a well-defined research topic, you’ll need to identify a clear and convincing research gap , along with a well-justified plan of action to fill that gap.

If you’re new to the oftentimes perplexing world of research, or if this is your first time undertaking a formal academic research project, be sure to check out our free dissertation mini-course. In it, we cover the process of writing a dissertation or thesis from start to end. Be sure to also sign up for our free webinar that explores how to find a high-quality research topic. 

Overview: CompSci Research Topics

  • Algorithms & data structures
  • Artificial intelligence ( AI )
  • Computer networking
  • Database systems
  • Human-computer interaction
  • Information security (IS)
  • Software engineering
  • Examples of CompSci dissertation & theses

Topics/Ideas: Algorithms & Data Structures

  • An analysis of neural network algorithms’ accuracy for processing consumer purchase patterns
  • A systematic review of the impact of graph algorithms on data analysis and discovery in social media network analysis
  • An evaluation of machine learning algorithms used for recommender systems in streaming services
  • A review of approximation algorithm approaches for solving NP-hard problems
  • An analysis of parallel algorithms for high-performance computing of genomic data
  • The influence of data structures on optimal algorithm design and performance in Fintech
  • A Survey of algorithms applied in internet of things (IoT) systems in supply-chain management
  • A comparison of streaming algorithm performance for the detection of elephant flows
  • A systematic review and evaluation of machine learning algorithms used in facial pattern recognition
  • Exploring the performance of a decision tree-based approach for optimizing stock purchase decisions
  • Assessing the importance of complete and representative training datasets in Agricultural machine learning based decision making.
  • A Comparison of Deep learning algorithms performance for structured and unstructured datasets with “rare cases”
  • A systematic review of noise reduction best practices for machine learning algorithms in geoinformatics.
  • Exploring the feasibility of applying information theory to feature extraction in retail datasets.
  • Assessing the use case of neural network algorithms for image analysis in biodiversity assessment

Topics & Ideas: Artificial Intelligence (AI)

  • Applying deep learning algorithms for speech recognition in speech-impaired children
  • A review of the impact of artificial intelligence on decision-making processes in stock valuation
  • An evaluation of reinforcement learning algorithms used in the production of video games
  • An exploration of key developments in natural language processing and how they impacted the evolution of Chabots.
  • An analysis of the ethical and social implications of artificial intelligence-based automated marking
  • The influence of large-scale GIS datasets on artificial intelligence and machine learning developments
  • An examination of the use of artificial intelligence in orthopaedic surgery
  • The impact of explainable artificial intelligence (XAI) on transparency and trust in supply chain management
  • An evaluation of the role of artificial intelligence in financial forecasting and risk management in cryptocurrency
  • A meta-analysis of deep learning algorithm performance in predicting and cyber attacks in schools

Research topic idea mega list

Topics & Ideas: Networking

  • An analysis of the impact of 5G technology on internet penetration in rural Tanzania
  • Assessing the role of software-defined networking (SDN) in modern cloud-based computing
  • A critical analysis of network security and privacy concerns associated with Industry 4.0 investment in healthcare.
  • Exploring the influence of cloud computing on security risks in fintech.
  • An examination of the use of network function virtualization (NFV) in telecom networks in Southern America
  • Assessing the impact of edge computing on network architecture and design in IoT-based manufacturing
  • An evaluation of the challenges and opportunities in 6G wireless network adoption
  • The role of network congestion control algorithms in improving network performance on streaming platforms
  • An analysis of network coding-based approaches for data security
  • Assessing the impact of network topology on network performance and reliability in IoT-based workspaces

Free Webinar: How To Find A Dissertation Research Topic

Topics & Ideas: Database Systems

  • An analysis of big data management systems and technologies used in B2B marketing
  • The impact of NoSQL databases on data management and analysis in smart cities
  • An evaluation of the security and privacy concerns of cloud-based databases in financial organisations
  • Exploring the role of data warehousing and business intelligence in global consultancies
  • An analysis of the use of graph databases for data modelling and analysis in recommendation systems
  • The influence of the Internet of Things (IoT) on database design and management in the retail grocery industry
  • An examination of the challenges and opportunities of distributed databases in supply chain management
  • Assessing the impact of data compression algorithms on database performance and scalability in cloud computing
  • An evaluation of the use of in-memory databases for real-time data processing in patient monitoring
  • Comparing the effects of database tuning and optimization approaches in improving database performance and efficiency in omnichannel retailing

Topics & Ideas: Human-Computer Interaction

  • An analysis of the impact of mobile technology on human-computer interaction prevalence in adolescent men
  • An exploration of how artificial intelligence is changing human-computer interaction patterns in children
  • An evaluation of the usability and accessibility of web-based systems for CRM in the fast fashion retail sector
  • Assessing the influence of virtual and augmented reality on consumer purchasing patterns
  • An examination of the use of gesture-based interfaces in architecture
  • Exploring the impact of ease of use in wearable technology on geriatric user
  • Evaluating the ramifications of gamification in the Metaverse
  • A systematic review of user experience (UX) design advances associated with Augmented Reality
  • A comparison of natural language processing algorithms automation of customer response Comparing end-user perceptions of natural language processing algorithms for automated customer response
  • Analysing the impact of voice-based interfaces on purchase practices in the fast food industry

Research Topic Kickstarter - Need Help Finding A Research Topic?

Topics & Ideas: Information Security

  • A bibliometric review of current trends in cryptography for secure communication
  • An analysis of secure multi-party computation protocols and their applications in cloud-based computing
  • An investigation of the security of blockchain technology in patient health record tracking
  • A comparative study of symmetric and asymmetric encryption algorithms for instant text messaging
  • A systematic review of secure data storage solutions used for cloud computing in the fintech industry
  • An analysis of intrusion detection and prevention systems used in the healthcare sector
  • Assessing security best practices for IoT devices in political offices
  • An investigation into the role social media played in shifting regulations related to privacy and the protection of personal data
  • A comparative study of digital signature schemes adoption in property transfers
  • An assessment of the security of secure wireless communication systems used in tertiary institutions

Topics & Ideas: Software Engineering

  • A study of agile software development methodologies and their impact on project success in pharmacology
  • Investigating the impacts of software refactoring techniques and tools in blockchain-based developments
  • A study of the impact of DevOps practices on software development and delivery in the healthcare sector
  • An analysis of software architecture patterns and their impact on the maintainability and scalability of cloud-based offerings
  • A study of the impact of artificial intelligence and machine learning on software engineering practices in the education sector
  • An investigation of software testing techniques and methodologies for subscription-based offerings
  • A review of software security practices and techniques for protecting against phishing attacks from social media
  • An analysis of the impact of cloud computing on the rate of software development and deployment in the manufacturing sector
  • Exploring the impact of software development outsourcing on project success in multinational contexts
  • An investigation into the effect of poor software documentation on app success in the retail sector

CompSci & IT Dissertations/Theses

While the ideas we’ve presented above are a decent starting point for finding a CompSci-related research topic, they are fairly generic and non-specific. So, it helps to look at actual dissertations and theses to see how this all comes together.

Below, we’ve included a selection of research projects from various CompSci-related degree programs to help refine your thinking. These are actual dissertations and theses, written as part of Master’s and PhD-level programs, so they can provide some useful insight as to what a research topic looks like in practice.

  • An array-based optimization framework for query processing and data analytics (Chen, 2021)
  • Dynamic Object Partitioning and replication for cooperative cache (Asad, 2021)
  • Embedding constructural documentation in unit tests (Nassif, 2019)
  • PLASA | Programming Language for Synchronous Agents (Kilaru, 2019)
  • Healthcare Data Authentication using Deep Neural Network (Sekar, 2020)
  • Virtual Reality System for Planetary Surface Visualization and Analysis (Quach, 2019)
  • Artificial neural networks to predict share prices on the Johannesburg stock exchange (Pyon, 2021)
  • Predicting household poverty with machine learning methods: the case of Malawi (Chinyama, 2022)
  • Investigating user experience and bias mitigation of the multi-modal retrieval of historical data (Singh, 2021)
  • Detection of HTTPS malware traffic without decryption (Nyathi, 2022)
  • Redefining privacy: case study of smart health applications (Al-Zyoud, 2019)
  • A state-based approach to context modeling and computing (Yue, 2019)
  • A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks (Solomon, 2019)
  • HRSB-Tree for Spatio-Temporal Aggregates over Moving Regions (Paduri, 2019)

Looking at these titles, you can probably pick up that the research topics here are quite specific and narrowly-focused , compared to the generic ones presented earlier. This is an important thing to keep in mind as you develop your own research topic. That is to say, to create a top-notch research topic, you must be precise and target a specific context with specific variables of interest . In other words, you need to identify a clear, well-justified research gap.

Fast-Track Your Research Topic

If you’re still feeling a bit unsure about how to find a research topic for your Computer Science dissertation or research project, check out our Topic Kickstarter service.

You Might Also Like:

Research topics and ideas about data science and big data analytics

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments.

Steps on getting this project topic

Joseph

I want to work with this topic, am requesting materials to guide.

Yadessa Dugassa

Information Technology -MSc program

Andrew Itodo

It’s really interesting but how can I have access to the materials to guide me through my work?

Sorie A. Turay

That’s my problem also.

kumar

Investigating the impacts of software refactoring techniques and tools in blockchain-based developments is in my favour. May i get the proper material about that ?

BEATRICE OSAMEGBE

BLOCKCHAIN TECHNOLOGY

Nanbon Temasgen

I NEED TOPIC

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • Print Friendly

CS 261: Research Topics in Operating Systems (2021)

Some links to papers are links to the ACM’s site. You may need to use the Harvard VPN to get access to the papers via those links. Alternate links will be provided.

Meeting 1 (1/26): Overview

Operating system architectures, meeting 2 (1/28): multics and unix.

“Multics—The first seven years” , Corbató FJ, Saltzer JH, and Clingen CT (1972)

“Protection in an information processing utility” , Graham RM (1968)

“The evolution of the Unix time-sharing system” , Ritchie DM (1984)

Additional resources

The Multicians web site for additional information on Multics, including extensive stories and Multics source code.

Technical: The Multics input/output system , Feiertag RJ and Organick EI, for a description of Multics I/O to contrast with Unix I/O.

Unix and Multics , Tom Van Vleck.

… I remarked to Dennis that easily half the code I was writing in Multics was error recovery code. He said, "We left all that stuff out. If there's an error, we have this routine called panic() , and when it is called, the machine crashes, and you holler down the hall, 'Hey, reboot it.'"

The Louisiana State Trooper Story

The IBM 7094 and CTSS

This describes the history of the system that preceded Multics, CTSS (the Compatible Time Sharing System). It also contains one of my favorite stories about the early computing days: “IBM had been very generous to MIT in the fifties and sixties, donating or discounting its biggest scientific computers. When a new top of the line 36-bit scientific machine came out, MIT expected to get one. In the early sixties, the deal was that MIT got one 8-hour shift, all the other New England colleges and universities got a shift, and the third shift was available to IBM for its own use. One use IBM made of its share was yacht handicapping: the President of IBM raced big yachts on Long Island Sound, and these boats were assigned handicap points by a complicated formula. There was a special job deck kept at the MIT Computation Center, and if a request came in to run it, operators were to stop whatever was running on the machine and do the yacht handicapping job immediately.”

Using Ring 5 , Randy Saunders.

"All Multics User functions work in Ring 5." I have that EMail (from Dave Bergum) framed on my wall to this date. … All the documentation clearly states that system software has ring brackets of [1,5,5] so that it runs equally in both rings 4 and 5. However, the PL/I compiler creates segments with ring brackets of [4,4,4] by default. … I found each and every place CNO had fixed a program without resetting the ring brackets correctly. It started out 5 a day, and in 3 months it was down to one a week.”

Bell Systems Technical Journal 57(6) Part 2: Unix Time-sharing System (July–August 1978)

This volume contains some of the first broadly-accessible descriptions of Unix. Individual articles are available on archive.org . As of late January 2021, you can buy a physical copy on Amazon for $2,996. Interesting articles include Thompson on Unix implementation, Ritchie’s retrospective, and several articles on actual applications, especially document preparation.

Meeting 3 (2/2): Microkernels

“The nucleus of a multiprogramming system” , Brinch Hansen P (1970).

“Toward real microkernels” , Liedtke J (1996).

“Are virtual machine monitors microkernels done right?” , Hand S, Warfield A, Fraser K, Kotsovinos E, Magenheimer DJ (2005).

Supplemental reading

“Improving IPC by kernel design” , Liedtke J (1993). Article introducing the first microbenchmark-performant microkernel.

“Are virtual machine monitors microkernels done right?” , Heiser G, Uhlig V, LeVasseur J (2006).

“From L3 to seL4: What have we learnt in 20 years of L4 microkernels?” , Elphinstone K, Heiser G (2013).

Retained: Minimality as key design principle. Replaced: Synchronous IPC augmented with (seL4, NOVA, Fiasco.OC) or replaced by (OKL4) asynchronous notification. Replaced: Physical by virtual message registers. Abandoned: Long IPC. Replaced: Thread IDs by port-like IPC endpoints as message destinations. Abandoned: IPC timeouts in seL4, OKL4. Abandoned: Clans and chiefs. Retained: User-level drivers as a core feature. Abandoned: Hierarchical process management. Multiple approaches: Some L4 kernels retain the model of recursive address-space construc- tion, while seL4 and OKL4 originate mappings from frames. Added: User-level control over kernel memory in seL4, kernel memory quota in Fiasco.OC. Unresolved: Principled, policy-free control of CPU time. Unresolved: Handling of multicore processors in the age of verification. Replaced: Process kernel by event kernel in seL4, OKL4 and NOVA. Abandoned: Virtual TCB addressing. … Abandoned: C++ for seL4 and OKL4.

Meeting 4 (2/4): Exokernels

“Exterminate all operating systems abstractions” , Engler DE, Kaashoek MF (1995).

“Exokernel: an operating system architecture for application-level resource management” , Engler DE, Kaashoek MF, O’Toole J (1995).

“The nonkernel: a kernel designed for the cloud” , Ben-Yehuda M, Peleg O, Ben-Yehuda OA, Smolyar I, Tsafrir D (2013).

“Application performance and flexibility on exokernel systems” , Kaashoek MF, Engler DR, Ganger GR, Briceño HM, Hunt R, Mazières D, Pinckney T, Grimm R, Jannotti J, Mackenzie K (1997).

Particularly worth reading is section 4, Multiplexing Stable Storage, which contains one of the most overcomplicated designs for stable storage imaginable. It’s instructive: if your principles end up here, might there be something wrong with your principles?

“Fast and flexible application-level networking on exokernel systems” , Ganger GR, Engler DE, Kaashoek MF, Briceño HM, Hunt R, Pinckney T (2002).

Particularly worth reading is section 8, Discussion: “The construction and revision of the Xok/ExOS networking support came with several lessons and controversial design decisions.”

Meeting 5 (2/9): Security

“EROS: A fast capability system” , Shapiro JS, Smith JM, Farber DJ (1999).

“Labels and event processes in the Asbestos operating system” , Vandebogart S, Efstathopoulos P, Kohler E, Krohn M, Frey C, Ziegler D, Kaashoek MF, Morris R, Mazières D (2007).

This paper covers too much ground. On the first read, skip sections 4–6.

Meeting 6 (2/11): I/O

“Arrakis: The operating system is the control plane” (PDF) , Peter S, Li J, Zhang I, Ports DRK, Woos D, Krishnamurthy A, Anderson T, Roscoe T (2014)

“The IX Operating System: Combining Low Latency, High Throughput, and Efficiency in a Protected Dataplane” , Belay A, Prekas G, Primorac M, Klimovic A, Grossman S, Kozyrakis C, Bugnion E (2016) — read Sections 1–4 first (return to the rest if you have time)

“I'm Not Dead Yet!: The Role of the Operating System in a Kernel-Bypass Era” , Zhang I, Liu J, Austin A, Roberts ML, Badam A (2019)

  • “The multikernel: A new OS architecture for scalable multicore systems” , Baumann A, Barham P, Dagand PE, Harris T, Isaacs R, Peter S, Roscoe T, Schüpach A, Singhana A (2009); this describes the Barrelfish system on which Arrakis is based

Meeting 7 (2/16): Speculative designs

From least to most speculative:

“Unified high-performance I/O: One Stack to Rule Them All” (PDF) , Trivedi A, Stuedi P, Metzler B, Pletka R, Fitch BG, Gross TR (2013)

“The Case for Less Predictable Operating System Behavior” (PDF) , Sun R, Porter DE, Oliveira D, Bishop M (2015)

“Quantum operating systems” , Corrigan-Gibbs H, Wu DJ, Boneh D (2017)

“Pursue robust indefinite scalability” , Ackley DH, Cannon DC (2013)

Meeting 8 (2/18): Log-structured file system

“The Design and Implementation of a Log-Structured File System” , Rosenblum M, Ousterhout J (1992)

“Logging versus Clustering: A Performance Evaluation”

  • Read the abstract of the paper ; scan further if you’d like
  • Then poke around the linked critiques

Meeting 9 (2/23): Consistency

“Generalized file system dependencies” , Frost C, Mammarella M, Kohler E, de los Reyes A, Hovsepian S, Matsuoka A, Zhang L (2007)

“Application crash consistency and performance with CCFS” , Sankaranarayana Pillai T, Alagappan R, Lu L, Chidambaram V, Arpaci-Dusseau AC, Arpaci-Dusseau RH (2017)

Meeting 10 (2/25): Transactions and speculation

“Rethink the sync” , Nightingale EB, Veeraraghavzn K, Chen PM, Flinn J (2006)

“Operating system transactions” , Porter DE, Hofmann OS, Rossbach CJ, Benn E, Witchel E (2009)

Meeting 11 (3/2): Speculative designs

“Can We Store the Whole World's Data in DNA Storage?”

“A tale of two abstractions: The case for object space”

“File systems as processes”

“Preserving hidden data with an ever-changing disk”

More, if you’re hungry for it

  • “Breaking Apart the VFS for Managing File Systems”

Virtualization

Meeting 14 (3/11): virtual machines and containers.

“Xen and the Art of Virtualization” , Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A (2003)

“Blending containers and virtual machines: A study of Firecracker and gVisor” , Anjali, Caraz-Harter T, Swift MM (2020)

Meeting 15 (3/18): Virtual memory and virtual devices

“Memory resource management in VMware ESX Server” , Waldspurger CA (2002)

“Opportunistic flooding to improve TCP transmit performance in virtualized clouds” , Gamage S, Kangarlou A, Kompella RR, Xu D (2011)

Meeting 16 (3/23): Speculative designs

“The Best of Both Worlds with On-Demand Virtualization” , Kooburat T, Swift M (2011)

“The NIC is the Hypervisor: Bare-Metal Guests in IaaS Clouds” , Mogul JC, Mudigonda J, Santos JR, Turner Y (2013)

“vPipe: One Pipe to Connect Them All!” , Gamage S, Kompella R, Xu D (2013)

“Scalable Cloud Security via Asynchronous Virtual Machine Introspection” , Rajasekaran S, Ni Z, Chawla HS, Shah N, Wood T (2016)

Distributed systems

Meeting 17 (3/25): distributed systems history.

“Grapevine: an exercise in distributed computing” , Birrell AD, Levin R, Schroeder MD, Needham RM (1982)

“Implementing remote procedure calls” , Birrell AD, Nelson BJ (1984)

Skim : “Time, clocks, and the ordering of events in a distributed system” , Lamport L (1978)

Meeting 18 (3/30): Paxos

“Paxos made simple” , Lamport L (2001)

“Paxos made live: an engineering perspective” , Chanra T, Griesemer R, Redston J (2007)

“In search of an understandable consensus algorithm” , Ongaro D, Ousterhout J (2014)

  • Adrian Colyer’s consensus series links to ten papers, especially:
  • “Raft Refloated: Do we have consensus?” , Howard H, Schwarzkopf M, Madhavapeddy A, Crowcroft J (2015)
  • A later update from overlapping authors: “Paxos vs. Raft: Have we reached consensus on distributed consensus?” , Howard H, Mortier R (2020)
  • “Understanding Paxos” , notes by Paul Krzyzanowski (2018); includes some failure examples
  • One-slide Paxos pseudocode , Robert Morris (2014)

Meeting 19 (4/1): Review of replication results

Meeting 20 (4/6): project discussion, meeting 21 (4/8): industrial consistency.

“Scaling Memcache at Facebook” , Nishtala R, Fugal H, Grimm S, Kwiatkowski M, Lee H, Li HC, McElroy R, Paleczny M, Peek D, Saab P, Stafford D, Tung T, Venkataramani V (2013)

“Millions of Tiny Databases” , Brooker M, Chen T, Ping F (2020)

Meeting 22 (4/13): Short papers and speculative designs

“Scalability! But at what COST?” , McSherry F, Isard M, Murray DG (2015)

“What bugs cause production cloud incidents?” , Liu H, Lu S, Musuvathi M, Nath S (2019)

“Escape Capsule: Explicit State Is Robust and Scalable” , Rajagopalan S, Williams D, Jamjoom H, Warfield A (2013)

“Music-defined networking” , Hogan M, Esposito F (2018)

  • Too networking-centric for us, but fun: “Delay is Not an Option: Low Latency Routing in Space” , Handley M (2018)
  • A useful taxonomy: “When Should The Network Be The Computer?” , Ports DRK, Nelson J (2019)

Meeting 23 (4/20): The M Group

“All File Systems Are Not Created Equal: On the Complexity of Crafting Crash-Consistent Applications” , Pillai TS, Chidambaram V, Alagappan R, Al-Kiswany S, Arpaci-Dusseau AC, Arpaci-Dusseau RH (2014)

“Crash Consistency Validation Made Easy” , Jiang Y, Chen H, Qin F, Xu C, Ma X, Lu J (2016)

Meeting 24 (4/22): NVM and Juice

“Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory” , Marathe VJ, Seltzer M, Byan S, Harris T

“NVMcached: An NVM-based Key-Value Cache” , Wu X, Ni F, Zhang L, Wang Y, Ren Y, Hack M, Shao Z, Jiang S (2016)

“Cloudburst: stateful functions-as-a-service” , Sreekanti V, Wu C, Lin XC, Schleier-Smith J, Gonzalez JE, Hellerstein JM, Tumanov A (2020)

  • Adrian Colyer’s take

Meeting 25 (4/27): Scheduling

  • “The Linux Scheduler: A Decade of Wasted Cores” , Lozi JP, Lepers B, Funston J, Gaud F, Quéma V, Fedorova A (2016)

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals

Information technology articles from across Nature Portfolio

Information technology is the design and implementation of computer networks for data processing and communication. This includes designing the hardware for processing information and connecting separate components, and developing software that can efficiently and faultlessly analyse and distribute this data.

computer information systems research paper topics

The dream of electronic newspapers becomes a reality — in 1974

Efforts to develop an electronic newspaper providing information at the touch of a button took a step forward 50 years ago, and airborne bacteria in the London Underground come under scrutiny, in the weekly dip into Nature ’s archive.

Latest Research and Reviews

computer information systems research paper topics

An ensemble learning model for forecasting water-pipe leakage

  • Ahmed Ali Mohamed Warad
  • Khaled Wassif
  • Nagy Ramadan Darwish

computer information systems research paper topics

A lightweight network model designed for alligator gar detection

computer information systems research paper topics

User factors affecting the use of digital services in five European regions and countries

  • Joy Goodman-Deane
  • Silvia Gaggi

computer information systems research paper topics

Adaptive temporal compression for reduction of computational complexity in human behavior recognition

  • Haixin Huang

computer information systems research paper topics

Towards determining perceived audience intent for multimodal social media posts using the theory of reasoned action

  • Trisha Mittal
  • Sanjoy Chowdhury
  • Dinesh Manocha

computer information systems research paper topics

Predicting vehicle travel time on city streets for trip preplanning and predicting heavy traffic for proactive control of street congestion

  • Samer Nofal

Advertisement

News and Comment

computer information systems research paper topics

Autonomous interference-avoiding machine-to-machine communications

An article in IEEE Journal on Selected Areas in Communications proposes algorithmic solutions to dynamically optimize MIMO waveforms to minimize or eliminate interference in autonomous machine-to-machine communications.

Combining quantum and AI for the next superpower

Quantum computing can benefit from the advancements made in artificial intelligence (AI) holistically across the tech stack — AI may even unlock completely new ways of using quantum computers. Simultaneously, AI can benefit from quantum computing leveraging the expected future compute and memory power.

  • Martina Gschwendtner
  • Henning Soller
  • Sheila Zingg

computer information systems research paper topics

How scientists are making the most of Reddit

As X wanes, researchers are turning to Reddit for insights and data, and to better connect with the public.

  • Hannah Docter-Loeb

computer information systems research paper topics

AI image generators often give racist and sexist results: can they be fixed?

Researchers are tracing sources of racial and gender bias in images generated by artificial intelligence, and making efforts to fix them.

computer information systems research paper topics

Why scientists trust AI too much — and what to do about it

Some researchers see superhuman qualities in artificial intelligence. All scientists need to be alert to the risks this creates.

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

computer information systems research paper topics

Banner

Computer Information Systems: Articles & Journals

  • Articles & Journals
  • Books & Ebooks
  • Standards & Patents
  • Citing & Writing Help
  • Career Resources
  • Using AI in Research This link opens in a new window

Find Articles in Research Databases

  • Computing databases
  • Business databases
  • Psychology databases
  • OneSearch  
  • Google Scholar
  • What is peer review?

How-to instructions

  • ACM Proceedings
  • ASIS&T Previous five years available free

Selected full text articles from journals, magazines, and trade publications, including industry and country reports, MarketLine company profiles, SWOT analyses, and more

How-to instructions for screen readers

Selected full text articles from business-related magazines and journals

Funded by TexShare

Primarily full text case studies, statistical data, news articles, journal articles, and topical reference materials organized by company, industry, and country; includes SWOT reports

  • Plunkett Research This link opens in a new window Analyzes industry trends, including finances, markets, technologies, deregulation, research/development and globalization; also includes industry statistics, company profiles, glossaries, and more

Full text (sometimes delayed for six months or more) for approximately 400 journals in psychology and related fields

Advanced Search

Sample search:    "critical thinking" AND ("higher education" OR college*)    (race OR racial) AND (discriminat* OR prejudic*) Select limiters (articles from scholarly publications, etc.) on results screen

While it doesn't offer some of the sophisticated options available in research databases, Google Scholar can be helpful. See instructions for customizing Google Scholar to provide Full Text @ UHCL links in results.

Google Scholar Search

A peer-reviewed (or refereed ) journal:

  • uses  experts from the same subject field or profession as the author to evaluate a manuscript prior to acceptance for publication
  • has articles that report on research studies or provide scholarly analysis of topics
  • may include book reviews, editorials, or other brief items that are not considered scholarly articles
  • Anatomy of a Scholarly Article Explains key elements from the first & last page of a typical scholarly or academic article. North Carolina State Univ. Libraries

Peer Review in 3 Minutes

(3:15) Explains the academic publishing process for research articles and scholarly journals, including the quality control process of peer review. North Carolina State Univ. Libraries

White Papers and Industry Publications

  • AISeL (Association for Information Systems Electronic Library) Repository for the ICIS, AMCIS, ECIS, PACIS, BLED, ACIS and MWAIS conference proceedings. Current AIS members can access the full text of all articles. Others can see indexing and selected tables of contents.
  • Bitpipe White papers, research guides, webcasts and case studies on various IT topics such as web services, networking, telecommunication, software development, storage, wireless and more.
  • The Information Technology Professional's Resource Center Provides links to networking related information available on the net, forums for IT professionals to interact, and full-text information and data on a variety of technologies.
  • TechRepublic: Research Library Includes webcasts, white papers, file downloads and more with information on various aspects of technology. Also has blogs and forums.

Get Full Text for an Article

If a database lacks immediate full text, click Find It @ UHCL  in results to check for full text from another source. Follow Available Online links in OneSearch to a resource with full text for UH Clear Lake users as shown below.

Shows Find It at UHCL leading to full text in EBSCOhost PsycARTICLES

If full text is not found, submit an article request .

  • Request a book, article, or other item ILLiad Interlibrary Loan logon

PDF

Finding Journal Title Abbreviations

  • Web of Science Journal Title Abbreviations list shows the abbreviations used for journal titles as cited works
  • All that JAS (Journal Abbreviations Sources)
  • << Previous: Home
  • Next: Books & Ebooks >>
  • Last Updated: Feb 28, 2024 10:47 AM
  • URL: https://uhcl.libguides.com/CINF

computer information systems research paper topics

Explore your training options in 10 minutes Get Started

  • Graduate Stories
  • Partner Spotlights
  • Bootcamp Prep
  • Bootcamp Admissions
  • University Bootcamps
  • Coding Tools
  • Software Engineering
  • Web Development
  • Data Science
  • Tech Guides
  • Tech Resources
  • Career Advice
  • Online Learning
  • Internships
  • Apprenticeships
  • Tech Salaries
  • Associate Degree
  • Bachelor's Degree
  • Master's Degree
  • University Admissions
  • Best Schools
  • Certifications
  • Bootcamp Financing
  • Higher Ed Financing
  • Scholarships
  • Financial Aid
  • Best Coding Bootcamps
  • Best Online Bootcamps
  • Best Web Design Bootcamps
  • Best Data Science Bootcamps
  • Best Technology Sales Bootcamps
  • Best Data Analytics Bootcamps
  • Best Cybersecurity Bootcamps
  • Best Digital Marketing Bootcamps
  • Los Angeles
  • San Francisco
  • Browse All Locations
  • Digital Marketing
  • Machine Learning
  • See All Subjects
  • Bootcamps 101
  • Full-Stack Development
  • Career Changes
  • View all Career Discussions
  • Mobile App Development
  • Cybersecurity
  • Product Management
  • UX/UI Design
  • What is a Coding Bootcamp?
  • Are Coding Bootcamps Worth It?
  • How to Choose a Coding Bootcamp
  • Best Online Coding Bootcamps and Courses
  • Best Free Bootcamps and Coding Training
  • Coding Bootcamp vs. Community College
  • Coding Bootcamp vs. Self-Learning
  • Bootcamps vs. Certifications: Compared
  • What Is a Coding Bootcamp Job Guarantee?
  • How to Pay for Coding Bootcamp
  • Ultimate Guide to Coding Bootcamp Loans
  • Best Coding Bootcamp Scholarships and Grants
  • Education Stipends for Coding Bootcamps
  • Get Your Coding Bootcamp Sponsored by Your Employer
  • GI Bill and Coding Bootcamps
  • Tech Intevriews
  • Our Enterprise Solution
  • Connect With Us
  • Publication
  • Reskill America
  • Partner With Us

Career Karma

  • Resource Center
  • Bachelor’s Degree
  • Master’s Degree

The Top 10 Most Interesting Computer Science Research Topics

Computer science touches nearly every area of our lives. With new advancements in technology, the computer science field is constantly evolving, giving rise to new computer science research topics. These topics attempt to answer various computer science research questions and how they affect the tech industry and the larger world.

Computer science research topics can be divided into several categories, such as artificial intelligence, big data and data science, human-computer interaction, security and privacy, and software engineering. If you are a student or researcher looking for computer research paper topics. In that case, this article provides some suggestions on examples of computer science research topics and questions.

Find your bootcamp match

What makes a strong computer science research topic.

A strong computer science topic is clear, well-defined, and easy to understand. It should also reflect the research’s purpose, scope, or aim. In addition, a strong computer science research topic is devoid of abbreviations that are not generally known, though, it can include industry terms that are currently and generally accepted.

Tips for Choosing a Computer Science Research Topic

  • Brainstorm . Brainstorming helps you develop a few different ideas and find the best topic for you. Some core questions you should ask are, What are some open questions in computer science? What do you want to learn more about? What are some current trends in computer science?
  • Choose a sub-field . There are many subfields and career paths in computer science . Before choosing a research topic, ensure that you point out which aspect of computer science the research will focus on. That could be theoretical computer science, contemporary computing culture, or even distributed computing research topics.
  • Aim to answer a question . When you’re choosing a research topic in computer science, you should always have a question in mind that you’d like to answer. That helps you narrow down your research aim to meet specified clear goals.
  • Do a comprehensive literature review . When starting a research project, it is essential to have a clear idea of the topic you plan to study. That involves doing a comprehensive literature review to better understand what has been learned about your topic in the past.
  • Keep the topic simple and clear. The topic should reflect the scope and aim of the research it addresses. It should also be concise and free of ambiguous words. Hence, some researchers recommended that the topic be limited to five to 15 substantive words. It can take the form of a question or a declarative statement.

What’s the Difference Between a Research Topic and a Research Question?

A research topic is the subject matter that a researcher chooses to investigate. You may also refer to it as the title of a research paper. It summarizes the scope of the research and captures the researcher’s approach to the research question. Hence, it may be broad or more specific. For example, a broad topic may read, Data Protection and Blockchain, while a more specific variant can read, Potential Strategies to Privacy Issues on the Blockchain.

On the other hand, a research question is the fundamental starting point for any research project. It typically reflects various real-world problems and, sometimes, theoretical computer science challenges. As such, it must be clear, concise, and answerable.

How to Create Strong Computer Science Research Questions

To create substantial computer science research questions, one must first understand the topic at hand. Furthermore, the research question should generate new knowledge and contribute to the advancement of the field. It could be something that has not been answered before or is only partially answered. It is also essential to consider the feasibility of answering the question.

Top 10 Computer Science Research Paper Topics

1. battery life and energy storage for 5g equipment.

The 5G network is an upcoming cellular network with much higher data rates and capacity than the current 4G network. According to research published in the European Scientific Institute Journal, one of the main concerns with the 5G network is the high energy consumption of the 5G-enabled devices . Hence, this research on this topic can highlight the challenges and proffer unique solutions to make more energy-efficient designs.

2. The Influence of Extraction Methods on Big Data Mining

Data mining has drawn the scientific community’s attention, especially with the explosive rise of big data. Many research results prove that the extraction methods used have a significant effect on the outcome of the data mining process. However, a topic like this analyzes algorithms. It suggests strategies and efficient algorithms that may help understand the challenge or lead the way to find a solution.

3. Integration of 5G with Analytics and Artificial Intelligence

According to the International Finance Corporation, 5G and AI technologies are defining emerging markets and our world. Through different technologies, this research aims to find novel ways to integrate these powerful tools to produce excellent results. Subjects like this often spark great discoveries that pioneer new levels of research and innovation. A breakthrough can influence advanced educational technology, virtual reality, metaverse, and medical imaging.

4. Leveraging Asynchronous FPGAs for Crypto Acceleration

To support the growing cryptocurrency industry, there is a need to create new ways to accelerate transaction processing. This project aims to use asynchronous Field-Programmable Gate Arrays (FPGAs) to accelerate cryptocurrency transaction processing. It explores how various distributed computing technologies can influence mining cryptocurrencies faster with FPGAs and generally enjoy faster transactions.

5. Cyber Security Future Technologies

Cyber security is a trending topic among businesses and individuals, especially as many work teams are going remote. Research like this can stretch the length and breadth of the cyber security and cloud security industries and project innovations depending on the researcher’s preferences. Another angle is to analyze existing or emerging solutions and present discoveries that can aid future research.

6. Exploring the Boundaries Between Art, Media, and Information Technology

The field of computers and media is a vast and complex one that intersects in many ways. They create images or animations using design technology like algorithmic mechanism design, design thinking, design theory, digital fabrication systems, and electronic design automation. This paper aims to define how both fields exist independently and symbiotically.

7. Evolution of Future Wireless Networks Using Cognitive Radio Networks

This research project aims to study how cognitive radio technology can drive evolution in future wireless networks. It will analyze the performance of cognitive radio-based wireless networks in different scenarios and measure its impact on spectral efficiency and network capacity. The research project will involve the development of a simulation model for studying the performance of cognitive radios in different scenarios.

8. The Role of Quantum Computing and Machine Learning in Advancing Medical Predictive Systems

In a paper titled Exploring Quantum Computing Use Cases for Healthcare , experts at IBM highlighted precision medicine and diagnostics to benefit from quantum computing. Using biomedical imaging, machine learning, computational biology, and data-intensive computing systems, researchers can create more accurate disease progression prediction, disease severity classification systems, and 3D Image reconstruction systems vital for treating chronic diseases.

9. Implementing Privacy and Security in Wireless Networks

Wireless networks are prone to attacks, and that has been a big concern for both individual users and organizations. According to the Cyber Security and Infrastructure Security Agency CISA, cyber security specialists are working to find reliable methods of securing wireless networks . This research aims to develop a secure and privacy-preserving communication framework for wireless communication and social networks.

10. Exploring the Challenges and Potentials of Biometric Systems Using Computational Techniques

Much discussion surrounds biometric systems and the potential for misuse and privacy concerns. When exploring how biometric systems can be effectively used, issues such as verification time and cost, hygiene, data bias, and cultural acceptance must be weighed. The paper may take a critical study into the various challenges using computational tools and predict possible solutions.

Other Examples of Computer Science Research Topics & Questions

Computer research topics.

  • The confluence of theoretical computer science, deep learning, computational algorithms, and performance computing
  • Exploring human-computer interactions and the importance of usability in operating systems
  • Predicting the limits of networking and distributed systems
  • Controlling data mining on public systems through third-party applications
  • The impact of green computing on the environment and computational science

Computer Research Questions

  • Why are there so many programming languages?
  • Is there a better way to enhance human-computer interactions in computer-aided learning?
  • How safe is cloud computing, and what are some ways to enhance security?
  • Can computers effectively assist in the sequencing of human genes?
  • How valuable is SCRUM methodology in Agile software development?

Choosing the Right Computer Science Research Topic

Computer science research is a vast field, and it can be challenging to choose the right topic. There are a few things to keep in mind when making this decision. Choose a topic that you are interested in. This will make it easier to stay motivated and produce high-quality research for your computer science degree .

Select a topic that is relevant to your field of study. This will help you to develop specialized knowledge in the area. Choose a topic that has potential for future research. This will ensure that your research is relevant and up-to-date. Typically, coding bootcamps provide a framework that streamlines students’ projects to a specific field, doing their search for a creative solution more effortless.

Computer Science Research Topics FAQ

To start a computer science research project, you should look at what other content is out there. Complete a literature review to know the available findings surrounding your idea. Design your research and ensure that you have the necessary skills and resources to complete the project.

The first step to conducting computer science research is to conceptualize the idea and review existing knowledge about that subject. You will design your research and collect data through surveys or experiments. Analyze your data and build a prototype or graphical model. You will also write a report and present it to a recognized body for review and publication.

You can find computer science research jobs on the job boards of many universities. Many universities have job boards on their websites that list open positions in research and academia. Also, many Slack and GitHub channels for computer scientists provide regular updates on available projects.

There are several hot topics and questions in AI that you can build your research on. Below are some AI research questions you may consider for your research paper.

  • Will it be possible to build artificial emotional intelligence?
  • Will robots replace humans in all difficult cumbersome jobs as part of the progress of civilization?
  • Can artificial intelligence systems self-improve with knowledge from the Internet?

About us: Career Karma is a platform designed to help job seekers find, research, and connect with job training programs to advance their careers. Learn about the CK publication .

What's Next?

icon_10

Get matched with top bootcamps

Ask a question to our community, take our careers quiz.

Saheed Aremu Olanrewaju

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Apply to top tech training programs in one click

  • Privacy Policy

Research Method

Home » 500+ Computer Science Research Topics

500+ Computer Science Research Topics

Computer Science Research Topics

Computer Science is a constantly evolving field that has transformed the world we live in today. With new technologies emerging every day, there are countless research opportunities in this field. Whether you are interested in artificial intelligence, machine learning, cybersecurity, data analytics, or computer networks, there are endless possibilities to explore. In this post, we will delve into some of the most interesting and important research topics in Computer Science. From the latest advancements in programming languages to the development of cutting-edge algorithms, we will explore the latest trends and innovations that are shaping the future of Computer Science. So, whether you are a student or a professional, read on to discover some of the most exciting research topics in this dynamic and rapidly expanding field.

Computer Science Research Topics

Computer Science Research Topics are as follows:

  • Using machine learning to detect and prevent cyber attacks
  • Developing algorithms for optimized resource allocation in cloud computing
  • Investigating the use of blockchain technology for secure and decentralized data storage
  • Developing intelligent chatbots for customer service
  • Investigating the effectiveness of deep learning for natural language processing
  • Developing algorithms for detecting and removing fake news from social media
  • Investigating the impact of social media on mental health
  • Developing algorithms for efficient image and video compression
  • Investigating the use of big data analytics for predictive maintenance in manufacturing
  • Developing algorithms for identifying and mitigating bias in machine learning models
  • Investigating the ethical implications of autonomous vehicles
  • Developing algorithms for detecting and preventing cyberbullying
  • Investigating the use of machine learning for personalized medicine
  • Developing algorithms for efficient and accurate speech recognition
  • Investigating the impact of social media on political polarization
  • Developing algorithms for sentiment analysis in social media data
  • Investigating the use of virtual reality in education
  • Developing algorithms for efficient data encryption and decryption
  • Investigating the impact of technology on workplace productivity
  • Developing algorithms for detecting and mitigating deepfakes
  • Investigating the use of artificial intelligence in financial trading
  • Developing algorithms for efficient database management
  • Investigating the effectiveness of online learning platforms
  • Developing algorithms for efficient and accurate facial recognition
  • Investigating the use of machine learning for predicting weather patterns
  • Developing algorithms for efficient and secure data transfer
  • Investigating the impact of technology on social skills and communication
  • Developing algorithms for efficient and accurate object recognition
  • Investigating the use of machine learning for fraud detection in finance
  • Developing algorithms for efficient and secure authentication systems
  • Investigating the impact of technology on privacy and surveillance
  • Developing algorithms for efficient and accurate handwriting recognition
  • Investigating the use of machine learning for predicting stock prices
  • Developing algorithms for efficient and secure biometric identification
  • Investigating the impact of technology on mental health and well-being
  • Developing algorithms for efficient and accurate language translation
  • Investigating the use of machine learning for personalized advertising
  • Developing algorithms for efficient and secure payment systems
  • Investigating the impact of technology on the job market and automation
  • Developing algorithms for efficient and accurate object tracking
  • Investigating the use of machine learning for predicting disease outbreaks
  • Developing algorithms for efficient and secure access control
  • Investigating the impact of technology on human behavior and decision making
  • Developing algorithms for efficient and accurate sound recognition
  • Investigating the use of machine learning for predicting customer behavior
  • Developing algorithms for efficient and secure data backup and recovery
  • Investigating the impact of technology on education and learning outcomes
  • Developing algorithms for efficient and accurate emotion recognition
  • Investigating the use of machine learning for improving healthcare outcomes
  • Developing algorithms for efficient and secure supply chain management
  • Investigating the impact of technology on cultural and societal norms
  • Developing algorithms for efficient and accurate gesture recognition
  • Investigating the use of machine learning for predicting consumer demand
  • Developing algorithms for efficient and secure cloud storage
  • Investigating the impact of technology on environmental sustainability
  • Developing algorithms for efficient and accurate voice recognition
  • Investigating the use of machine learning for improving transportation systems
  • Developing algorithms for efficient and secure mobile device management
  • Investigating the impact of technology on social inequality and access to resources
  • Machine learning for healthcare diagnosis and treatment
  • Machine Learning for Cybersecurity
  • Machine learning for personalized medicine
  • Cybersecurity threats and defense strategies
  • Big data analytics for business intelligence
  • Blockchain technology and its applications
  • Human-computer interaction in virtual reality environments
  • Artificial intelligence for autonomous vehicles
  • Natural language processing for chatbots
  • Cloud computing and its impact on the IT industry
  • Internet of Things (IoT) and smart homes
  • Robotics and automation in manufacturing
  • Augmented reality and its potential in education
  • Data mining techniques for customer relationship management
  • Computer vision for object recognition and tracking
  • Quantum computing and its applications in cryptography
  • Social media analytics and sentiment analysis
  • Recommender systems for personalized content delivery
  • Mobile computing and its impact on society
  • Bioinformatics and genomic data analysis
  • Deep learning for image and speech recognition
  • Digital signal processing and audio processing algorithms
  • Cloud storage and data security in the cloud
  • Wearable technology and its impact on healthcare
  • Computational linguistics for natural language understanding
  • Cognitive computing for decision support systems
  • Cyber-physical systems and their applications
  • Edge computing and its impact on IoT
  • Machine learning for fraud detection
  • Cryptography and its role in secure communication
  • Cybersecurity risks in the era of the Internet of Things
  • Natural language generation for automated report writing
  • 3D printing and its impact on manufacturing
  • Virtual assistants and their applications in daily life
  • Cloud-based gaming and its impact on the gaming industry
  • Computer networks and their security issues
  • Cyber forensics and its role in criminal investigations
  • Machine learning for predictive maintenance in industrial settings
  • Augmented reality for cultural heritage preservation
  • Human-robot interaction and its applications
  • Data visualization and its impact on decision-making
  • Cybersecurity in financial systems and blockchain
  • Computer graphics and animation techniques
  • Biometrics and its role in secure authentication
  • Cloud-based e-learning platforms and their impact on education
  • Natural language processing for machine translation
  • Machine learning for predictive maintenance in healthcare
  • Cybersecurity and privacy issues in social media
  • Computer vision for medical image analysis
  • Natural language generation for content creation
  • Cybersecurity challenges in cloud computing
  • Human-robot collaboration in manufacturing
  • Data mining for predicting customer churn
  • Artificial intelligence for autonomous drones
  • Cybersecurity risks in the healthcare industry
  • Machine learning for speech synthesis
  • Edge computing for low-latency applications
  • Virtual reality for mental health therapy
  • Quantum computing and its applications in finance
  • Biomedical engineering and its applications
  • Cybersecurity in autonomous systems
  • Machine learning for predictive maintenance in transportation
  • Computer vision for object detection in autonomous driving
  • Augmented reality for industrial training and simulations
  • Cloud-based cybersecurity solutions for small businesses
  • Natural language processing for knowledge management
  • Machine learning for personalized advertising
  • Cybersecurity in the supply chain management
  • Cybersecurity risks in the energy sector
  • Computer vision for facial recognition
  • Natural language processing for social media analysis
  • Machine learning for sentiment analysis in customer reviews
  • Explainable Artificial Intelligence
  • Quantum Computing
  • Blockchain Technology
  • Human-Computer Interaction
  • Natural Language Processing
  • Cloud Computing
  • Robotics and Automation
  • Augmented Reality and Virtual Reality
  • Cyber-Physical Systems
  • Computational Neuroscience
  • Big Data Analytics
  • Computer Vision
  • Cryptography and Network Security
  • Internet of Things
  • Computer Graphics and Visualization
  • Artificial Intelligence for Game Design
  • Computational Biology
  • Social Network Analysis
  • Bioinformatics
  • Distributed Systems and Middleware
  • Information Retrieval and Data Mining
  • Computer Networks
  • Mobile Computing and Wireless Networks
  • Software Engineering
  • Database Systems
  • Parallel and Distributed Computing
  • Human-Robot Interaction
  • Intelligent Transportation Systems
  • High-Performance Computing
  • Cyber-Physical Security
  • Deep Learning
  • Sensor Networks
  • Multi-Agent Systems
  • Human-Centered Computing
  • Wearable Computing
  • Knowledge Representation and Reasoning
  • Adaptive Systems
  • Brain-Computer Interface
  • Health Informatics
  • Cognitive Computing
  • Cybersecurity and Privacy
  • Internet Security
  • Cybercrime and Digital Forensics
  • Cloud Security
  • Cryptocurrencies and Digital Payments
  • Machine Learning for Natural Language Generation
  • Cognitive Robotics
  • Neural Networks
  • Semantic Web
  • Image Processing
  • Cyber Threat Intelligence
  • Secure Mobile Computing
  • Cybersecurity Education and Training
  • Privacy Preserving Techniques
  • Cyber-Physical Systems Security
  • Virtualization and Containerization
  • Machine Learning for Computer Vision
  • Network Function Virtualization
  • Cybersecurity Risk Management
  • Information Security Governance
  • Intrusion Detection and Prevention
  • Biometric Authentication
  • Machine Learning for Predictive Maintenance
  • Security in Cloud-based Environments
  • Cybersecurity for Industrial Control Systems
  • Smart Grid Security
  • Software Defined Networking
  • Quantum Cryptography
  • Security in the Internet of Things
  • Natural language processing for sentiment analysis
  • Blockchain technology for secure data sharing
  • Developing efficient algorithms for big data analysis
  • Cybersecurity for internet of things (IoT) devices
  • Human-robot interaction for industrial automation
  • Image recognition for autonomous vehicles
  • Social media analytics for marketing strategy
  • Quantum computing for solving complex problems
  • Biometric authentication for secure access control
  • Augmented reality for education and training
  • Intelligent transportation systems for traffic management
  • Predictive modeling for financial markets
  • Cloud computing for scalable data storage and processing
  • Virtual reality for therapy and mental health treatment
  • Data visualization for business intelligence
  • Recommender systems for personalized product recommendations
  • Speech recognition for voice-controlled devices
  • Mobile computing for real-time location-based services
  • Neural networks for predicting user behavior
  • Genetic algorithms for optimization problems
  • Distributed computing for parallel processing
  • Internet of things (IoT) for smart cities
  • Wireless sensor networks for environmental monitoring
  • Cloud-based gaming for high-performance gaming
  • Social network analysis for identifying influencers
  • Autonomous systems for agriculture
  • Robotics for disaster response
  • Data mining for customer segmentation
  • Computer graphics for visual effects in movies and video games
  • Virtual assistants for personalized customer service
  • Natural language understanding for chatbots
  • 3D printing for manufacturing prototypes
  • Artificial intelligence for stock trading
  • Machine learning for weather forecasting
  • Biomedical engineering for prosthetics and implants
  • Cybersecurity for financial institutions
  • Machine learning for energy consumption optimization
  • Computer vision for object tracking
  • Natural language processing for document summarization
  • Wearable technology for health and fitness monitoring
  • Internet of things (IoT) for home automation
  • Reinforcement learning for robotics control
  • Big data analytics for customer insights
  • Machine learning for supply chain optimization
  • Natural language processing for legal document analysis
  • Artificial intelligence for drug discovery
  • Computer vision for object recognition in robotics
  • Data mining for customer churn prediction
  • Autonomous systems for space exploration
  • Robotics for agriculture automation
  • Machine learning for predicting earthquakes
  • Natural language processing for sentiment analysis in customer reviews
  • Big data analytics for predicting natural disasters
  • Internet of things (IoT) for remote patient monitoring
  • Blockchain technology for digital identity management
  • Machine learning for predicting wildfire spread
  • Computer vision for gesture recognition
  • Natural language processing for automated translation
  • Big data analytics for fraud detection in banking
  • Internet of things (IoT) for smart homes
  • Robotics for warehouse automation
  • Machine learning for predicting air pollution
  • Natural language processing for medical record analysis
  • Augmented reality for architectural design
  • Big data analytics for predicting traffic congestion
  • Machine learning for predicting customer lifetime value
  • Developing algorithms for efficient and accurate text recognition
  • Natural Language Processing for Virtual Assistants
  • Natural Language Processing for Sentiment Analysis in Social Media
  • Explainable Artificial Intelligence (XAI) for Trust and Transparency
  • Deep Learning for Image and Video Retrieval
  • Edge Computing for Internet of Things (IoT) Applications
  • Data Science for Social Media Analytics
  • Cybersecurity for Critical Infrastructure Protection
  • Natural Language Processing for Text Classification
  • Quantum Computing for Optimization Problems
  • Machine Learning for Personalized Health Monitoring
  • Computer Vision for Autonomous Driving
  • Blockchain Technology for Supply Chain Management
  • Augmented Reality for Education and Training
  • Natural Language Processing for Sentiment Analysis
  • Machine Learning for Personalized Marketing
  • Big Data Analytics for Financial Fraud Detection
  • Cybersecurity for Cloud Security Assessment
  • Artificial Intelligence for Natural Language Understanding
  • Blockchain Technology for Decentralized Applications
  • Virtual Reality for Cultural Heritage Preservation
  • Natural Language Processing for Named Entity Recognition
  • Machine Learning for Customer Churn Prediction
  • Big Data Analytics for Social Network Analysis
  • Cybersecurity for Intrusion Detection and Prevention
  • Artificial Intelligence for Robotics and Automation
  • Blockchain Technology for Digital Identity Management
  • Virtual Reality for Rehabilitation and Therapy
  • Natural Language Processing for Text Summarization
  • Machine Learning for Credit Risk Assessment
  • Big Data Analytics for Fraud Detection in Healthcare
  • Cybersecurity for Internet Privacy Protection
  • Artificial Intelligence for Game Design and Development
  • Blockchain Technology for Decentralized Social Networks
  • Virtual Reality for Marketing and Advertising
  • Natural Language Processing for Opinion Mining
  • Machine Learning for Anomaly Detection
  • Big Data Analytics for Predictive Maintenance in Transportation
  • Cybersecurity for Network Security Management
  • Artificial Intelligence for Personalized News and Content Delivery
  • Blockchain Technology for Cryptocurrency Mining
  • Virtual Reality for Architectural Design and Visualization
  • Natural Language Processing for Machine Translation
  • Machine Learning for Automated Image Captioning
  • Big Data Analytics for Stock Market Prediction
  • Cybersecurity for Biometric Authentication Systems
  • Artificial Intelligence for Human-Robot Interaction
  • Blockchain Technology for Smart Grids
  • Virtual Reality for Sports Training and Simulation
  • Natural Language Processing for Question Answering Systems
  • Machine Learning for Sentiment Analysis in Customer Feedback
  • Big Data Analytics for Predictive Maintenance in Manufacturing
  • Cybersecurity for Cloud-Based Systems
  • Artificial Intelligence for Automated Journalism
  • Blockchain Technology for Intellectual Property Management
  • Virtual Reality for Therapy and Rehabilitation
  • Natural Language Processing for Language Generation
  • Machine Learning for Customer Lifetime Value Prediction
  • Big Data Analytics for Predictive Maintenance in Energy Systems
  • Cybersecurity for Secure Mobile Communication
  • Artificial Intelligence for Emotion Recognition
  • Blockchain Technology for Digital Asset Trading
  • Virtual Reality for Automotive Design and Visualization
  • Natural Language Processing for Semantic Web
  • Machine Learning for Fraud Detection in Financial Transactions
  • Big Data Analytics for Social Media Monitoring
  • Cybersecurity for Cloud Storage and Sharing
  • Artificial Intelligence for Personalized Education
  • Blockchain Technology for Secure Online Voting Systems
  • Virtual Reality for Cultural Tourism
  • Natural Language Processing for Chatbot Communication
  • Machine Learning for Medical Diagnosis and Treatment
  • Big Data Analytics for Environmental Monitoring and Management.
  • Cybersecurity for Cloud Computing Environments
  • Virtual Reality for Training and Simulation
  • Big Data Analytics for Sports Performance Analysis
  • Cybersecurity for Internet of Things (IoT) Devices
  • Artificial Intelligence for Traffic Management and Control
  • Blockchain Technology for Smart Contracts
  • Natural Language Processing for Document Summarization
  • Machine Learning for Image and Video Recognition
  • Blockchain Technology for Digital Asset Management
  • Virtual Reality for Entertainment and Gaming
  • Natural Language Processing for Opinion Mining in Online Reviews
  • Machine Learning for Customer Relationship Management
  • Big Data Analytics for Environmental Monitoring and Management
  • Cybersecurity for Network Traffic Analysis and Monitoring
  • Artificial Intelligence for Natural Language Generation
  • Blockchain Technology for Supply Chain Transparency and Traceability
  • Virtual Reality for Design and Visualization
  • Natural Language Processing for Speech Recognition
  • Machine Learning for Recommendation Systems
  • Big Data Analytics for Customer Segmentation and Targeting
  • Cybersecurity for Biometric Authentication
  • Artificial Intelligence for Human-Computer Interaction
  • Blockchain Technology for Decentralized Finance (DeFi)
  • Virtual Reality for Tourism and Cultural Heritage
  • Machine Learning for Cybersecurity Threat Detection and Prevention
  • Big Data Analytics for Healthcare Cost Reduction
  • Cybersecurity for Data Privacy and Protection
  • Artificial Intelligence for Autonomous Vehicles
  • Blockchain Technology for Cryptocurrency and Blockchain Security
  • Virtual Reality for Real Estate Visualization
  • Natural Language Processing for Question Answering
  • Big Data Analytics for Financial Markets Prediction
  • Cybersecurity for Cloud-Based Machine Learning Systems
  • Artificial Intelligence for Personalized Advertising
  • Blockchain Technology for Digital Identity Verification
  • Virtual Reality for Cultural and Language Learning
  • Natural Language Processing for Semantic Analysis
  • Machine Learning for Business Forecasting
  • Big Data Analytics for Social Media Marketing
  • Artificial Intelligence for Content Generation
  • Blockchain Technology for Smart Cities
  • Virtual Reality for Historical Reconstruction
  • Natural Language Processing for Knowledge Graph Construction
  • Machine Learning for Speech Synthesis
  • Big Data Analytics for Traffic Optimization
  • Artificial Intelligence for Social Robotics
  • Blockchain Technology for Healthcare Data Management
  • Virtual Reality for Disaster Preparedness and Response
  • Natural Language Processing for Multilingual Communication
  • Machine Learning for Emotion Recognition
  • Big Data Analytics for Human Resources Management
  • Cybersecurity for Mobile App Security
  • Artificial Intelligence for Financial Planning and Investment
  • Blockchain Technology for Energy Management
  • Virtual Reality for Cultural Preservation and Heritage.
  • Big Data Analytics for Healthcare Management
  • Cybersecurity in the Internet of Things (IoT)
  • Artificial Intelligence for Predictive Maintenance
  • Computational Biology for Drug Discovery
  • Virtual Reality for Mental Health Treatment
  • Machine Learning for Sentiment Analysis in Social Media
  • Human-Computer Interaction for User Experience Design
  • Cloud Computing for Disaster Recovery
  • Quantum Computing for Cryptography
  • Intelligent Transportation Systems for Smart Cities
  • Cybersecurity for Autonomous Vehicles
  • Artificial Intelligence for Fraud Detection in Financial Systems
  • Social Network Analysis for Marketing Campaigns
  • Cloud Computing for Video Game Streaming
  • Machine Learning for Speech Recognition
  • Augmented Reality for Architecture and Design
  • Natural Language Processing for Customer Service Chatbots
  • Machine Learning for Climate Change Prediction
  • Big Data Analytics for Social Sciences
  • Artificial Intelligence for Energy Management
  • Virtual Reality for Tourism and Travel
  • Cybersecurity for Smart Grids
  • Machine Learning for Image Recognition
  • Augmented Reality for Sports Training
  • Natural Language Processing for Content Creation
  • Cloud Computing for High-Performance Computing
  • Artificial Intelligence for Personalized Medicine
  • Virtual Reality for Architecture and Design
  • Augmented Reality for Product Visualization
  • Natural Language Processing for Language Translation
  • Cybersecurity for Cloud Computing
  • Artificial Intelligence for Supply Chain Optimization
  • Blockchain Technology for Digital Voting Systems
  • Virtual Reality for Job Training
  • Augmented Reality for Retail Shopping
  • Natural Language Processing for Sentiment Analysis in Customer Feedback
  • Cloud Computing for Mobile Application Development
  • Artificial Intelligence for Cybersecurity Threat Detection
  • Blockchain Technology for Intellectual Property Protection
  • Virtual Reality for Music Education
  • Machine Learning for Financial Forecasting
  • Augmented Reality for Medical Education
  • Natural Language Processing for News Summarization
  • Cybersecurity for Healthcare Data Protection
  • Artificial Intelligence for Autonomous Robots
  • Virtual Reality for Fitness and Health
  • Machine Learning for Natural Language Understanding
  • Augmented Reality for Museum Exhibits
  • Natural Language Processing for Chatbot Personality Development
  • Cloud Computing for Website Performance Optimization
  • Artificial Intelligence for E-commerce Recommendation Systems
  • Blockchain Technology for Supply Chain Traceability
  • Virtual Reality for Military Training
  • Augmented Reality for Advertising
  • Natural Language Processing for Chatbot Conversation Management
  • Cybersecurity for Cloud-Based Services
  • Artificial Intelligence for Agricultural Management
  • Blockchain Technology for Food Safety Assurance
  • Virtual Reality for Historical Reenactments
  • Machine Learning for Cybersecurity Incident Response.
  • Secure Multiparty Computation
  • Federated Learning
  • Internet of Things Security
  • Blockchain Scalability
  • Quantum Computing Algorithms
  • Explainable AI
  • Data Privacy in the Age of Big Data
  • Adversarial Machine Learning
  • Deep Reinforcement Learning
  • Online Learning and Streaming Algorithms
  • Graph Neural Networks
  • Automated Debugging and Fault Localization
  • Mobile Application Development
  • Software Engineering for Cloud Computing
  • Cryptocurrency Security
  • Edge Computing for Real-Time Applications
  • Natural Language Generation
  • Virtual and Augmented Reality
  • Computational Biology and Bioinformatics
  • Internet of Things Applications
  • Robotics and Autonomous Systems
  • Explainable Robotics
  • 3D Printing and Additive Manufacturing
  • Distributed Systems
  • Parallel Computing
  • Data Center Networking
  • Data Mining and Knowledge Discovery
  • Information Retrieval and Search Engines
  • Network Security and Privacy
  • Cloud Computing Security
  • Data Analytics for Business Intelligence
  • Neural Networks and Deep Learning
  • Reinforcement Learning for Robotics
  • Automated Planning and Scheduling
  • Evolutionary Computation and Genetic Algorithms
  • Formal Methods for Software Engineering
  • Computational Complexity Theory
  • Bio-inspired Computing
  • Computer Vision for Object Recognition
  • Automated Reasoning and Theorem Proving
  • Natural Language Understanding
  • Machine Learning for Healthcare
  • Scalable Distributed Systems
  • Sensor Networks and Internet of Things
  • Smart Grids and Energy Systems
  • Software Testing and Verification
  • Web Application Security
  • Wireless and Mobile Networks
  • Computer Architecture and Hardware Design
  • Digital Signal Processing
  • Game Theory and Mechanism Design
  • Multi-agent Systems
  • Evolutionary Robotics
  • Quantum Machine Learning
  • Computational Social Science
  • Explainable Recommender Systems.
  • Artificial Intelligence and its applications
  • Cloud computing and its benefits
  • Cybersecurity threats and solutions
  • Internet of Things and its impact on society
  • Virtual and Augmented Reality and its uses
  • Blockchain Technology and its potential in various industries
  • Web Development and Design
  • Digital Marketing and its effectiveness
  • Big Data and Analytics
  • Software Development Life Cycle
  • Gaming Development and its growth
  • Network Administration and Maintenance
  • Machine Learning and its uses
  • Data Warehousing and Mining
  • Computer Architecture and Design
  • Computer Graphics and Animation
  • Quantum Computing and its potential
  • Data Structures and Algorithms
  • Computer Vision and Image Processing
  • Robotics and its applications
  • Operating Systems and its functions
  • Information Theory and Coding
  • Compiler Design and Optimization
  • Computer Forensics and Cyber Crime Investigation
  • Distributed Computing and its significance
  • Artificial Neural Networks and Deep Learning
  • Cloud Storage and Backup
  • Programming Languages and their significance
  • Computer Simulation and Modeling
  • Computer Networks and its types
  • Information Security and its types
  • Computer-based Training and eLearning
  • Medical Imaging and its uses
  • Social Media Analysis and its applications
  • Human Resource Information Systems
  • Computer-Aided Design and Manufacturing
  • Multimedia Systems and Applications
  • Geographic Information Systems and its uses
  • Computer-Assisted Language Learning
  • Mobile Device Management and Security
  • Data Compression and its types
  • Knowledge Management Systems
  • Text Mining and its uses
  • Cyber Warfare and its consequences
  • Wireless Networks and its advantages
  • Computer Ethics and its importance
  • Computational Linguistics and its applications
  • Autonomous Systems and Robotics
  • Information Visualization and its importance
  • Geographic Information Retrieval and Mapping
  • Business Intelligence and its benefits
  • Digital Libraries and their significance
  • Artificial Life and Evolutionary Computation
  • Computer Music and its types
  • Virtual Teams and Collaboration
  • Computer Games and Learning
  • Semantic Web and its applications
  • Electronic Commerce and its advantages
  • Multimedia Databases and their significance
  • Computer Science Education and its importance
  • Computer-Assisted Translation and Interpretation
  • Ambient Intelligence and Smart Homes
  • Autonomous Agents and Multi-Agent Systems.

About the author

' src=

Muhammad Hassan

Researcher, Academic Writer, Web developer

You may also like

Funny Research Topics

200+ Funny Research Topics

Sports Research Topics

500+ Sports Research Topics

American History Research Paper Topics

300+ American History Research Paper Topics

Cyber Security Research Topics

500+ Cyber Security Research Topics

Environmental Research Topics

500+ Environmental Research Topics

Economics Research Topics

500+ Economics Research Topics

  • How it works

researchprospect post subheader

Useful Links

How much will your dissertation cost?

Have an expert academic write your dissertation paper!

Dissertation Services

Dissertation Services

Get unlimited topic ideas and a dissertation plan for just £45.00

Order topics and plan

Order topics and plan

Get 1 free topic in your area of study with aim and justification

Yes I want the free topic

Yes I want the free topic

Information Technology Dissertation Topics

Published by Owen Ingram at December 29th, 2022 , Revised On March 23, 2023

Information technology stands out as one of the latest discoveries of the twenty-first century. According to researchers, technology is currently undergoing an era of transformation. Yet, despite all the hype, many students struggle to figure out a topic for their degree in Information Technology.

Nonetheless, we are right here to direct our students and show them a ray of hope. A comprehensive list of advanced dissertation topics in the field of information systems is provided below for students to pick a topic that suits their interests and research.

Related Academic Resource: Business Information Technology Topics , Technology Dissertation Topics , Green Technology Dissertation Topics

List of IT Dissertation Topics Having Potential for Research

  • A literature analysis on the information quality management framework
  • A comprehensive investigation of the information system hierarchy
  • Big data and business intelligence are essential for sustainable development in organisations: Discuss a UK-based perspective
  • Correlation between Information systems management and risk management infrastructure to achieve business risk resilience
  • Impact of the Coronavirus on the management of X country’s information systems
  • The function of structured versus unstructured data in managing information systems
  • A review of the literature on business intelligence management and information systems
  • Pre- and post-COVID analysis of the impact of information systems on organisational performance
  • Implementing IT governance and managing information systems
  • A descriptive overview of IS strategic planning and management services
  • A review of the literature on international information system security
  • Information systems management historical analysis focusing on the last three decades
  • The part that planning, alignment, and leadership play in information systems management
  • A systematic review of the post-COVID era for information systems management research
  • Difficulties and possible challenges in the International Management of Information systems
  • A thorough analysis of information policy and global information systems management
  • How to handle data management in the era of 5G technologies?
  • Human-computer interaction’s effect on innovations
  • How does machine learning introduce students to more modern career opportunities?
  • Consider the use of molecular information systems in biotechnology
  • How has information technology aided in the processing of natural language?
  • What are the most recent advancements in software engineering and programming languages?
  • An examination of new potential in the robotics industry.
  • What factors should I take into account while buying a bandwidth monitor?
  • How do we develop an efficient clinic management system for intensive care?
  • Reasons why e-waste management solutions should be used worldwide ASAP
  • Motives for why cyberbullying persists in modern communication technologies
  • Interpersonal communication has changed as a result of the development of information technology
  • The effect of 3D printing on medical practice
  • How well do colleges and universities produce qualified computer scientists using robots in infectious disease units?
  • How ethical hacking has become more harmful
  • Why having specialised financial systems is important
  • What is the best security precaution: A fingerprint or a serial number?
  • How to strengthen patent protection for technical advances?
  • An overview of the many software security measures.

Dissertation Writing Services

Orders completed by our expert writers are

  • Formally drafted in an academic style
  • Free Amendments and 100% Plagiarism Free – or your money back!
  • 100% Confidential and Timely Delivery!
  • Free anti-plagiarism report
  • Appreciated by thousands of clients. Check client reviews

Dissertation Writing Services

Do you have a dissertation topic in the field of information technology? If not, our competent dissertation writers are at your disposal. The importance of technology research cannot be overstated. Several students are required to complete their information technology dissertations.

Our well-qualified dissertation writer offers research topics in the field of information technology to these students. Such assistance includes writing a dissertation and finding significant and relevant dissertation topics . Place your order now to enjoy our services !

You May Also Like

Need interesting and manageable Architecture dissertation topics? Here are the trending Architecture dissertation titles so you can choose the most suitable one.

Need interesting and manageable civil engineering dissertation topics or thesis? Here are the trending civil engineering dissertation titles so you can choose the most suitable one.

Looking for a list of the most intriguing dissertation topic ideas on wildlife? Our wildlife dissertation topics are suggested by experts.

USEFUL LINKS

LEARNING RESOURCES

researchprospect-reviews-trust-site

COMPANY DETAILS

Research-Prospect-Writing-Service

  • How It Works

help for assessment

  • Customer Reviews
  • Extended Essays
  • IB Internal Assessment
  • Theory of Knowledge
  • Literature Review
  • Dissertations
  • Essay Writing
  • Research Writing
  • Assignment Help
  • Capstone Projects
  • College Application
  • Online Class

Computer Science Research Paper Topics: 30+ Ideas for You

Author Image

by  Antony W

November 26, 2023

computer science research paper topics

We’ve written a lot on computer science to know that choosing research paper topics in the subject isn’t as easy as flipping a bulb’s switch. Brainstorming can take an entire afternoon before you come up with something constructive.

However, looking at prewritten topics is a great way to identify an idea to guide your research. 

In this post, we give you a list of 20+ research paper topics on computer science to cut your ideation time to zero.

  • Scan the list.
  • Identify what topic piques your interest
  • Develop your research question , and
  • Follow our guide to write a research paper .

Key Takeaways 

  • Computer science is a broad field, meaning you can come up with endless number of topics for your research paper.
  • With the freedom to choose the topic you want, consider working on a theme that you’ve always wanted to investigate.
  • Focusing your research on a trending topic in the computer science space can be a plus.
  • As long as a topic allows you to complete the steps of a research process with ease, work on it.

Computer Science Research Paper Topics

The following are 30+ research topics and ideas from which you can choose a title for your computer science project:

Artificial Intelligence Topics

AI made its first appearance in 1958 when Frank Rosenblatt developed the first deep neural network that could generate an original idea. Yet, there’s no time Artificial Intelligence has ever been a profound as it is right now. Interesting and equally controversial, AI opens door to an array of research opportunity, meaning there are countless topics that you can investigate in a project, including the following:

  • Write about the efficacy of deep learning algorithms in forecasting and mitigating cyber-attacks within educational institutions. 
  • Focus on a study of the transformative impact of recent advances in natural language processing.
  • Explain Artificial Intelligence’s influence on stock valuation decision-making, making sure you touch on impacts and implications.
  • Write a research project on harnessing deep learning for speech recognition in children with speech impairments.
  • Focus your paper on an in-depth evaluation of reinforcement learning algorithms in video game development.
  • Write a research project that focuses on the integration of artificial intelligence in orthopedic surgery.
  • Examine the social implications and ethical considerations of AI-based automated marking systems.
  • Artificial Intelligence’s role in cryptocurrency: Evaluating its impact on financial forecasting and risk management
  • The confluence of large-scale GIS datasets with AI and machine learning

Data Structure and Algorithms Topics

Topics on data structure and algorithm focus on the storage, retrieval, and efficient use of data. Here are some ideas that you may find interesting for a research project in this area:

  • Do an in-depth investigation of the efficacy of deep learning algorithms on structured and unstructured datasets.
  • Conduct a comprehensive survey of approximation algorithms for solving NP-hard problems.
  • Analyze the performance of decision tree-based approaches in optimizing stock purchasing decisions.
  • Do a critical examination of the accuracy of neural network algorithms in processing consumer purchase patterns.
  • Explore parallel algorithms for high-performance computing of genomic data. 
  • Evaluate machine-learning algorithms in facial pattern recognition.
  • Examine the applicability of neural network algorithms for image analysis in biodiversity assessment
  • Investigate the impact of data structures on optimal algorithm design and performance in financial technology
  • Write a research paper on the survey of algorithm applications in Internet of Things (IoT) systems for supply-chain management.

Networking Topics

The networking topics in research focus on the communication between computer devices. Your project can focus on data transmission, data exchange, and data resources. You can focus on media access control, network topology design, packet classification, and so much more. Here are some ideas to get you started with your research: 

  • Analyzing the influence of 5g technology on rural internet accessibility in Africa
  • The significance of network congestion control algorithms in enhancing streaming platform performance
  • Evaluate the role of software-defined networking in contemporary cloud-based computing environments
  • Examining the impact of network topology on performance and reliability of internet-of-things
  • A comprehensive investigation of the integration of network function virtualization in telecommunication networks across South America
  • A critical appraisal of network security and privacy challenges amid industry investments in healthcare
  • Assessing the influence of edge computing on network architecture and design within Internet of Things
  • Evaluating challenges and opportunities in the adoption of 6g wireless networks
  • Exploring the intersection of cloud computing and security risks in the financial technology sector
  • An analysis of network coding-based approaches for enhanced data security

Database Topic Ideas

Computer science relies heavily on data to produce information. This data requires efficient and secure management and mitigation for it to be of any good value. Given just how wide this area is as well, your database research topic can be on anything that you find fascinating to explore. Below are some ideas to get started:

  • Examining big data management systems and technologies in business-to-business marketing
  • Assessing the use of in-memory databases for real-time data processing in patient monitoring
  • An analytical study on the implementation of graph databases for data modeling and analysis in recommendation systems
  • Understanding the impact of NOSQL databases on data management and analysis within smart cities
  • The evolving dynamics of database design and management in the retail grocery industry under the influence of the internet of things
  • Evaluating the effects of data compression algorithms on database performance and scalability in cloud computing environments
  • An in-depth examination of the challenges and opportunities presented by distributed databases in supply chain management
  • Addressing security and privacy concerns of cloud-based databases in financial organizations
  • Comparative analysis of database tuning and optimization approaches for enhancing efficiency in Omni channel retailing
  • Exploring the nexus of data warehousing and business intelligence in the landscape of global consultancies

Free Features

work-free-features

Need help to complete and ace your essay? Order our writing service.  

Get all academic paper features for $65.77 FREE

About the author 

Antony W is a professional writer and coach at Help for Assessment. He spends countless hours every day researching and writing great content filled with expert advice on how to write engaging essays, research papers, and assignments.

You are using an outdated browser. Please upgrade your browser .

T4Tutorials.com

Information systems research topics for ms phd, information systems research topic ideas for ms, or ph.d. degree.

I am sharing with you some of the research topics regarding Information Systems that you can choose for your research proposal for the thesis work of MS, or Ph.D. Degree.

  • A survey on blockchain for information systems management and security
  • The perils and promises of big data research in information systems
  • A novel Dual-Blockchained structure for contract-theoretic LoRa-based information systems
  • A novel decision-making approach based on three-way decisions in fuzzy information systems
  • Review and critique of the information systems development project failure literature: An argument for exploring information systems development project distress
  • Product decision-making information systems, real-time big data analytics, and deep learning-enabled smart process planning in sustainable industry 4.0
  • Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems
  • Human resource information systems
  • The role of three-dimensional geographic information systems in subsurface characterization for hydrogeological applications
  • Cognition digital twins for personalized information systems of smart cities: Proof of concept
  • Trust in Management Information Systems (MIS) A Theoretical Model
  • Exploring the characteristics and utilisation of Farm Management Information Systems (FMIS) in Germany
  • Managing risk in information systems
  • Data science: developing theoretical contributions in information systems via text analytics
  • The Determinants of management information systems effectiveness in small-and medium-sized enterprises
  • Accounting information systems: controls and processes
  • Weaponizing information systems for political disruption: The actor, lever, effects, and response taxonomy (ALERT)
  • A systematic review of social media acceptance from the perspective of educational and information systems theories and models
  • End-user participation in health information systems (HIS) development: Physicians’ and nurses’ experiences
  • Financial Management Information Systems and accounting policies retention in Brazil
  • A common attribute reduction form for information systems
  • … quality factors matter in enhancing the perceived benefits of online health information sites? Application of the updated DeLone and McLean Information Systems …
  • Geographic information systems (GIS) for disaster management
  • Enabling supply chain analytics for enterprise information systems: a topic modelling literature review and future research agenda
  • A Systematic Review of Empirical Affordance studies: Recommendations for Affordance Research in Information Systems.
  • Applying Team-Based Learning in Online Introductory Information Systems Courses
  • Complexity and Information Systems Rsearch in the Emerging Digital World
  • Public health informatics and information systems
  • Analyzing the location of city logistics centers in Istanbul by integrating Geographic Information Systems with Binary Particle Swarm Optimization algorithm
  • Understanding the challenges associated with the use of data from routine health information systems in low-and middle-income countries: A systematic review
  • Integration of the Dimensions of Computerized Health Information Systems and Their Role in Improving Administrative Performance in Al-Shifa Medical Complex
  • Accounting information systems in the blockchain era
  • Continuous transition from model-driven prototype to full-size real-world enterprise information systems
  • On the Use of Qualitative Comparative Analysis in Information Systems Research-A Critical Review
  • Implementation of business intelligence considering the role of information systems integration and enterprise resource planning
  • Utilizing chemometrics and geographical information systems to evaluate spatial and temporal variations of coastal water quality
  • Optimizing data quality of pharmaceutical information systems in public health care in resource limited settings
  • The impact of Public Sector Scorecard adoption on the effectiveness of accounting information systems towards the sustainable performance in Public Sector
  • The role of information systems in decision-making and public policy making
  • Analysis of barriers to the deployment of health information systems: A stakeholder perspective
  • Reengineering of Information Systems toward Classical-Quantum Systems.
  • Safe use of hospital information systems: an evaluation model based on a sociotechnical perspective
  • Organizational information security management for sustainable information systems: An unethical employee information security behavior perspective
  • Organization of a virtual enterprise in information systems
  • Twenty‐five years of the Information Systems Journal: A bibliometric and ontological overview
  • Green Information Systems Refraction for Corporate Ecological Responsibility Reflection in ICT Based Firms: Explicating Technology Organization Environment …
  • A Data Analytics Framework for Smart Asthma Management Based on Remote Health Information Systems with Bluetooth-Enabled Personal Inhalers.
  • Utilisation of hospital information systems for medical research in Saudi Arabia: A mixed-method exploration of the views of healthcare and IT professionals involved in …
  • Unconstrained design: Improving multitasking with in-vehicle information systems through enhanced situation awareness
  • The architecture of computer hardware, systems software, and networking: An information technology approach
  • Covid-19 pandemic and suicide in France: An opportunity to improve information systems
  • Information Technology and Systems: Proceedings of ICITS 2020
  • Risk Management in Information Technology
  • The effects of information systems compatibility on firm performance following mergers and acquisitions
  • Information Systems Students’ Impressions on Learning Modeling Enterprise Architectures
  • Drivers of intentions to use healthcare information systems among health and care professionals
  • Vulnerability and protection of business management systems: threats and challenges
  • Development of algorithm for analysis of sound fragments in medical information systems
  • A framework for validating information systems research based on a pluralist account of truth and correctness
  • Use of ontology learning in information system integration: a literature survey
  • Conceptmap: A conceptual approach for formulating user preferences in large information spaces
  • An Analysis of Point of Sales (POS) Information Systems in SMEswith The Black Box Testing and PIECES Method
  • Design principles for the General Data Protection Regulation (GDPR): A formal concept analysis and its evaluation
  • Virtually in this together–how web-conferencing systems enabled a new virtual togetherness during the COVID-19 crisis
  • Roadmap to strengthen global mental health systems to tackle the impact of the COVID-19 pandemic
  • Information and Communication Infrastructures in Modern Wide-Area Systems
  • Cyber-Physical Systems: a multi-criteria assessment for Internet-of-Things (IoT) systems
  • On the declarative paradigm in hybrid business process representations: A conceptual framework and a systematic literature study
  • Compact and high-performance vortex mode sorter for multi-dimensional multiplexed fiber communication systems
  • A modeling method for systematic architecture reconstruction of microservice-based software systems
  • Decision support systems for agriculture 4.0: Survey and challenges
  • Blockchain adoption from an interorganizational systems perspective–a mixed-methods approach
  • Exploiting chemistry and molecular systems for quantum information science
  • Information Technology Governance: Reflections on the Past and Future Directions
  • The price of fairness-A framework to explore trade-offs in algorithmic fairness
  • Shared Ledger Accounting—Implementing the Economic Exchange Pattern
  • Implications of Knowledge Organization Systems for Health Information Exchange and Communication during the COVID-19 Pandemic
  • Using secondary data to tell a new story: A cautionary tale in health information technology research
  • Combining symbiotic simulation systems with enterprise data storage systems for real-time decision-making
  • Integration of new information in memory: new insights from a complementary learning systems perspective
  • What drives unverified information sharing and cyberchondria during the COVID-19 pandemic?
  • The rise of human machines: How cognitive computing systems challenge assumptions of user-system interaction
  • Community-diversified influence maximization in social networks
  • Electronic religious programs on islamic subjects on the example of the sanctuary of Al-Hakim Al-Termizi
  • An incremental attribute reduction approach based on knowledge granularity for incomplete decision systems
  • Unpacking the difference between digital transformation and IT-enabled organizational transformation
  • Information scrambling at finite temperature in local quantum systems
  • Auditing cloud-based blockchain accounting systems
  • Eye-tracking-based classification of information search behavior using machine learning: evidence from experiments in physical shops and virtual reality shopping …
  • Uncertain information and linear systems
  • Maritime reporting systems
  • Evaluating E-learning systems success: An empirical study
  • Information freshness in cache updating systems
  • Business models shifts: Impact of Covid-19
  • A trustworthiness-based vehicular recruitment scheme for information collections in distributed networked systems
  • Medical information retrieval systems for e-Health care records using fuzzy based machine learning model
  • On the reliability of test collections for evaluating systems of different types
  • Global health crises are also information crises: A call to action
  • Review of compact computational spectral information acquisition systems
  • A pre-filtering approach for incorporating contextual information into deep learning based recommender systems
  • Mapping county-level mobility pattern changes in the United States in response to COVID-19
  • Banana Classification Using Deep Learning
  • Information technology elements for optical systems of identification of autonomous underwater vehicles
  • Time-efficient target tags information collection in large-scale RFID systems
  • Blockchain and the united nations sustainable development goals: towards an agenda for is research
  • Infrastructural sovereignty over agreement and transaction data (‘metadata’) in an open network-model for multilateral sharing of sensitive data
  • Are high-performing health systems resilient against the COVID-19 epidemic?
  • The search for smartness in working, living and organising: beyond the ‘Technomagic’
  • Covert communications without channel state information at receiver in IoT systems
  • Hypertext: from text to expertext
  • JSON: Data model and query languages
  • Introduction to ultra-wideband radar systems
  • Machine learning based diagnosis of diseases using the unfolded EEG spectra: towards an intelligent software sensor
  • A review of research relevant to the emerging industry trends: Industry 4.0, IoT, blockchain, and business analytics
  • Principles of construction of systems for diagnosing the energy equipment
  • Editorial reflections: Lockdowns, slow downs, and some introductions
  • Containing COVID-19 through physical distancing: the impact of real-time crowding information
  • Evaluating content novelty in recommender systems
  • Smart city model based on systems theory
  • Type of Grapefruit Classification Using Deep Learning
  • Information technology audit quality: an investigation of the impact of individual and organizational factors
  • Directions for professional social matching systems
  • Conceptual approach to building a digital twin of the production system
  • New information technologies in the estimation of stationary modes of the third type systems
  • RF systems design for simultaneous wireless information and power transfer (SWIPT) in automation and transportation
  • Capturing the complexity of gamification elements: a holistic approach for analysing existing and deriving novel gamification designs
  • Optimal site selection for solar photovoltaic (PV) power plants using GIS and AHP: A case study of Malatya Province, Turkey
  • Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users
  • Eight grand challenges in socio-environmental systems modeling
  • Future integrated mobility-energy systems: A modeling perspective
  • A novel framework to evaluate innovation value proposition for smart product–service systems
  • Diagnostic Systems For Energy Equipments
  • Utilising neutrosophic theory to solve transition difficulties of IoT-based enterprises
  • Towards smart farming: Systems, frameworks and exploitation of multiple sources
  • Measuring Resilience of Human–Spatial Systems to Disasters: Framework Combining Spatial-Network Analysis and Fisher Information
  • Age of information for multicast transmission with fixed and random deadlines in IoT systems
  • The role of personality and linguistic patterns in discriminating between fake news spreaders and fact checkers
  • Mapping the incidence of the COVID-19 hotspot in Iran–Implications for Travellers
  • How farmers shape cultural landscapes. Dealing with information in farm systems (Vallès County, Catalonia, 1860)
  • An overview of clinical decision support systems: benefits, risks, and strategies for success
  • Will the COVID-19 pandemic change waste generation and composition?: The need for more real-time waste management data and systems thinking
  • Digital Systems and New Challenges of Financial Management–FinTech, XBRL, Blockchain and Cryptocurrencies
  • Identity asymmetries: An experimental investigation of social identity and information exchange in multiteam systems
  • How enterprises adopt agile forms of organizational design: a multiple-case study
  • Acceptance of text-mining systems: The signaling role of information quality
  • Improving health care management in hospitals through a productivity dashboard
  • The construction of smart city information system based on the Internet of Things and cloud computing
  • Foundations of cryptoeconomic systems
  • Information distribution in multi-robot systems: Utility-based evaluation model
  • Dew computing architecture for cyber-physical systems and IoT
  • The port as a set of socio-technical systems: A multi-organisational view
  • IOS drivers of manufacturer-supplier flexibility and manufacturer agility
  • A secure authenticated and key exchange scheme for fog computing
  • Information and communication technologies in tourism
  • The effect of customer lifestyle patterns on the use of mobile banking applications in Jordan
  • Human identification for activities of daily living: A deep transfer learning approach
  • The geography of transport systems
  • Virtual reality
  • Technical provision of diagnostic systems
  • The contribution of systems science to Industry 4.0
  • Peers matter: The moderating role of social influence on information security policy compliance
  • On the age of information in internet of things systems with correlated devices
  • A survey on knowledge graph-based recommender systems
  • How corporate social responsibility activities influence employer reputation: The role of social media capability
  • A dual systems model of online impulse buying
  • Explanatory and predictive model of the adoption of P2P payment systems
  • Public Health Informatics: An Introduction
  • Principles of ties of internal control and management accounting systems at the enterprises of black metallurgy
  • Pivot-based approximate k-NN similarity joins for big high-dimensional data
  • Classifying nuts types using convolutional neural network
  • Enabling the analysis of personality aspects in recommender systems
  • Transparency and accountability in AI decision support: Explaining and visualizing convolutional neural networks for text information
  • Cornac: A Comparative Framework for Multimodal Recommender Systems
  • Trust information network in social Internet of things using trust-aware recommender systems
  • The Role of KM in Enhancing AI Algorithms and Systems
  • Towards a characterisation of smart systems: A systematic literature review
  • Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life
  • Output and regulated output synchronization of heterogeneous multi-agent systems: A scale-free protocol design using no information about communication network …
  • Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks
  • How voluntary information sharing systems form: Evidence from a us commercial credit bureau
  • Designing multistage search systems to support the information seeking process
  • Recent Advances in Flexible and Stretchable Sensing Systems: From the Perspective of System Integration
  • Integrating geospatial technologies and unmanned aircraft systems into the grower’s disease management toolbox
  • A development framework for decision support systems in high-performance sport
  • Information resource orchestration during the COVID-19 pandemic: A study of community lockdowns in China
  • IoT Data Management—Security Aspects of Information Linkage in IoT Systems
  • Task recommendation in crowdsourcing systems: A bibliometric analysis
  • Survey on various conversational systems
  • The Role Of Blockchain As A Security Support For Student Profiles In Technology Education Systems
  • Reliability bounds for multi-state systems by fusing multiple sources of imprecise information
  • On the design of output information-based sliding mode controllers for switched descriptor systems: Linear sliding variable approach
  • The pinar del río geography and connected photovoltaic systems to grid
  • Challenges and future directions of computational advertising measurement systems
  • Fisher information and Shannon entropy calculations for two-electron systems
  • TAMING COMPLEXITY IN SEARCH MATCHING: TWO-SIDED RECOMMENDER SYSTEMS ON DIGITAL PLATFORMS.
  • An extensive study on the evolution of context-aware personalized travel recommender systems
  • Clustering and self-organization in small-scale natural and artificial systems
  • Establishing smart service systems is a challenge: a case study on pitfalls and implications
  • Designing, developing, and deploying artificial intelligence systems: Lessons from and for the public sector
  • The negative skycube
  • Towards digital engineering: the advent of digital systems engineering
  • An Integrated model of continuous intention to use of google classroom
  • Port Community Systems: A structured literature review
  • Working towards a multimedia learning environment: experiences in the classroom
  • Large-scale question tagging via joint question-topic embedding learning
  • Skills, Certifications, or Degrees: What Companies Demand for Entry-Level Cybersecurity Jobs.
  • Geographic objects with indeterminate boundaries
  • Recent advances and challenges in task-oriented dialog systems
  • Industry 4.0 integration with socio-technical systems theory: A systematic review and proposed theoretical model
  • Diagnosis of arthritis using adaptive hierarchical Mamdani fuzzy type-1 expert system
  • Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system
  • Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
  • Factors that affect accounting information system success and its implication on accounting information quality
  • Reconciliation of privacy with preventive cybersecurity: The bright internet approach
  • How to perform and report an impactful analysis using partial least squares: Guidelines for confirmatory and explanatory IS research
  • A survey on conversational recommender systems
  • A human-in-the-loop manufacturing control architecture for the next generation of production systems
  • Dynamic representations in networked neural systems
  • Cognitive twins for supporting decision-makings of Internet of Things systems
  • Challenges in building intelligent open-domain dialog systems
  • Organizational and environmental influences in the adoption of computer-assisted audit tools and techniques (CAATTs) by audit firms in Malaysia
  • Mutual clustering on comparative texts via heterogeneous information networks
  • Smart production systems drivers for business process management improvement
  • Real time dataset generation framework for intrusion detection systems in IoT
  • COVID-19 pandemic: Shifting digital transformation to a high-speed gear
  • Design Theory Indeterminacy: What is it, how can it be reduced, and why did the polar bear drown?
  • A cloud-based platform for the non-invasive management of coronary artery disease
  • A practical GIS-based hazard assessment framework for water quality in stormwater systems
  • An affordance perspective of team collaboration and enforced working from home during COVID-19
  • Health Information Systems, 2008
  • Applications and Datasets for Superpixel Techniques: A Survey
  • An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain
  • What makes a review a reliable rating in recommender systems?
  • Revocation Mechanisms for Academic Certificates Stored on a Blockchain
  • Context-Aware Recommendations Based on Deep Learning Frameworks
  • Towards automating the synthesis of chatbots for conversational model query
  • A hierarchical model to evaluate the quality of web-based e-learning systems
  • Blockchain technology-enabled supply chain systems and supply chain performance: a resource-based view
  • Analyzing Cryptocurrencies
  • Estimation-action-reflection: Towards deep interaction between conversational and recommender systems
  • Recommender systems and their ethical challenges
  • Advanced Database systems
  • Towards predictive maintenance for flexible manufacturing using FIWARE
  • Automated continuous noninvasive ward monitoring: validation of measurement systems is the real challenge
  • Digital nomads
  • An Algorithm to Select an Energy-Efficient Sever for an Application Process in a Cluster of Servers
  • Evolution and revolution: Personality research for the coming world of robots, artificial intelligence, and autonomous systems
  • Considering random factors in modeling complex microeconomic systems
  • Discrete event-driven model predictive control for real-time work-in-process optimization in serial production systems
  • Challenges to transforming unconventional social media data into actionable knowledge for public health systems during disasters
  • An analysis of learners’ intentions toward virtual reality online learning systems: a case study in Taiwan
  • Techno-unreliability: a pilot study in the field
  • Learning relational fractals for deep knowledge graph embedding in online social networks
  • A novel approach towards using big data and IoT for improving the efficiency of m-health systems
  • Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies
  • State machine based human-bot conversation model and services
  • Contributions of scale: what we stand to gain from Indigenous and local inclusion in climate and health monitoring and surveillance systems
  • Intelligent knowledge lakes: The age of artificial intelligence and big data
  • Learning management systems: a review of the research methodology literature in Australia and China
  • Performance Analysis of Machine Learning Algorithms for Cervical Cancer Detection
  • Privacy in Dynamical Systems
  • Prominence and engagement: Different mechanisms regulating continuance and contribution in online communities
  • Evaluation of views regarding pharmacy information management systems implementation and systemic issues in community pharmacies
  • A critical look at theories in design science research
  • What affects usage satisfaction in mobile payments? Modelling user generated content to develop the “digital service usage satisfaction model”
  • A survey on empathetic dialogue systems
  • Method of constructing explanations for recommender systems based on the temporal dynamics of user preferences
  • How Foreign and Domestic Firms Differ in Leveraging IT-enabled Supply Chain Information Integration in BOP Markets: The Role of Supplier and Client …
  • … trial of an information technology enhanced peer-integrated collaborative care intervention versus enhanced usual care for us trauma care systems: clinical …
  • From responsive to adaptive and interactive materials and materials systems: A roadmap
  • A multi-dimensional model of Enterprise Resource Planning critical success factors
  • A minimum centre distance rule activation method for extended belief rule-based classification systems
  • A fuzzy-based system for assessment of available edge computing resources in a cloud-fog-edge SDN-VANETs architecture
  • Advances in smart environment monitoring systems using iot and sensors
  • Understanding the apparent superiority of over-sampling through an analysis of local information for class-imbalanced data
  • About trust in the information systems on the basis of internet-based technologies
  • Cyber-physical production systems retrofitting in context of industry 4.0
  • Distributed maximum correntropy filtering for stochastic nonlinear systems under deception attacks
  • Adaptive rule adaptation in unstructured and dynamic environments
  • Systems thinking: A review and bibliometric analysis
  • Introduction to unmanned aircraft systems
  • Recent advances and opportunities for improving critical realism-based case study research in IS
  • Data analytics in higher education: an integrated view
  • Governance by Other Means: Rankings as Regulatory Systems
  • Codifying Interdisciplinary Design Knowledge through Patterns–The Case of Smart Personal Assistants
  • Critical factors in information technology capability for enhancing firm’s environmental performance: case of Indonesian ICT sector
  • A Model Management Platform for Industry 4.0–Enabling Management of Machine Learning Models in Manufacturing Environments
  • Compact polarizers for satellite information systems
  • Combining multicriteria decision analysis and GIS to assess vulnerability within a protected area: An objective methodology for managing complex and fragile systems
  • Contextualizing the effective use of social media network for collaborative learning: An affordance perspective
  • Explaining the link between technostress and technology addiction for social networking sites: A study of distraction as a coping behavior
  • Design of an Inclusive Financial Privacy Index (INF-PIE): A Financial Privacy and Digital Financial Inclusion Perspective
  • Applying a systematic literature review and content analysis method to analyse open source developers’ forking motivation interpretation, categories and …
  • Satellite communications systems: systems, techniques and technology
  • TOPSIS method for developing supplier selection with probabilistic linguistic information
  • The role of information technology in organization and management in tourism
  • Big data analytics in healthcare: a systematic literature review
  • Configuration Optimization and Channel Estimation in Hybrid Beamforming mmWave Systems With Channel Support Side Information
  • High-Capacity Robust Image Steganography via Adversarial Network.
  • Does Tailoring Gamified Educational Systems Matter? The Impact on Students’ Flow Experience
  • Soft systems methodology
  • Computer Tools for Energy Systems
  • Customer loyalty improves the effectiveness of recommender systems based on complex network
  • Assessment of workforce systems preferences/skills based on Employment domain
  • Efficient NTRU lattice-based certificateless signature scheme for medical cyber-physical systems
  • Market drivers of sustainability and sustainability learning capabilities: The moderating role of sustainability control systems
  • Fedfast: Going beyond average for faster training of federated recommender systems
  • Sustainability management control systems in higher education institutions from measurement to management
  • Understanding user trust in artificial intelligence‐based educational systems: Evidence from China
  • Feature selection using genetic algorithms for the generation of a recognition and classification of children activities model using environmental sound
  • Attributes reductions of bipolar fuzzy relation decision systems
  • Basic classes in conceptual modeling: theory and practical guidelines
  • Dynamic-sos: An approach for the simulation of systems-of-systems dynamic architectures
  • A novel software engineering approach toward using machine learning for improving the efficiency of health systems
  • Emergent properties of foveated perceptual systems
  • Fuzzy model estimation of the risk factors impact on the target of promotion of the software product
  • A real-time data-driven collaborative mechanism in fixed-position assembly systems for smart manufacturing
  • Ontologies as nested facet systems for human–data interaction
  • Incorporating rainwater harvesting systems in Iran’s potable water-saving scheme by using a GIS-simulation based decision support system
  • Digital storytelling and blockchain as pedagogy and technology to support the development of an inclusive smart learning ecosystem
  • … of everyday life–How COVID-19 pandemic transformed the basic education of the young generation and why information management research should care?
  • Teaching programming to the post-millennial generation: Pedagogic considerations for an IS course
  • Uncertainty in information system development: Causes, effects, and coping mechanisms
  • An effective training scheme for deep neural network in edge computing enabled Internet of medical things (IoMT) systems
  • Bureaucracy as a lens for analyzing and designing algorithmic systems
  • Strictly linear light cones in long-range interacting systems of arbitrary dimensions
  • Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion
  • How Much Method-in-Use Matters? A Case Study of Agile and Waterfall Software Projects and Their Design Routine Variation
  • Underground channel model for visible light wireless communication based on neural networks
  • Enhancing the classification of social media opinions by optimizing the structural information
  • Web Scraping with HTML DOM Method for Data Collection of Scientific Articles from Google Scholar
  • Robotic process mining: vision and challenges
  • High-performance work systems, innovation and knowledge sharing
  • A systematic analysis of the optimization of computerized physician order entry and clinical decision support systems: a qualitative study in English hospitals
  • Software systems from smart city vendors
  • Information Processing, Information Networking, Cognitive Apparatuses and Sentient Software Systems
  • WAx: An integrated conceptual framework for the analysis of cyber-socio-technical systems
  • On data lake architectures and metadata management
  • Interactive planning support systems with citizens: Lessons learned from renewable energy planning in the Netherlands
  • Professional identity and the adoption of learning management systems
  • Towards Anticipatory Information Systems and Action: Notes on Early Warning and Early Action in East Africa
  • Perception and prediction of intention to use online banking systems: An empirical study using extended TAM
  • Automated verbal autopsy: from research to routine use in civil registration and vital statistics systems
  • Adaptive event-triggered control for unknown second-order nonlinear multiagent systems
  • Resource awareness in unmanned aerial vehicle-assisted mobile-edge computing systems
  • Improved covering-based collaborative filtering for new users’ personalized recommendations
  • A new model for the selection of information technology project in a neutrosophic environment
  • Experience versus expectation: Farmers’ perceptions of smart farming technologies for cropping systems across Europe
  • Agility and the role of project—Internal control systems for innovation project performance
  • Introducing systems approaches
  • Decreasing the problematic use of an information system: An empirical investigation of smartphone game players
  • Off-policy learning in two-stage recommender systems
  • Efficient neural matrix factorization without sampling for recommendation
  • Application of k-means clustering algorithm for determination of fire-prone areas utilizing hotspots in West Kalimantan Province
  • Sentiment word co-occurrence and knowledge pair feature extraction based LDA short text clustering algorithm
  • Smart contract invocation protocol (SCIP): A protocol for the uniform integration of heterogeneous blockchain smart contracts
  • Monetizing Online Content: Digital Paywall Design and Configuration
  • Adaptive systems for internet-delivered psychological treatments
  • STFT cluster analysis for DC pulsed load monitoring and fault detection on naval shipboard power systems
  • A decade of NeuroIS research: progress, challenges, and future directions
  • Examining the channel choice of experience-oriented customers in Omni-Channel retailing
  • On the ability of virtual agents to decrease cognitive load: an experimental study
  • Neighborhood multi-granulation rough sets-based attribute reduction using Lebesgue and entropy measures in incomplete neighborhood decision systems
  • Recursive coupled projection algorithms for multivariable output-error-like systems with coloured noises
  • A dynamic deep-learning-based virtual edge node placement scheme for edge cloud systems in mobile environment
  • Dbkwik: extracting and integrating knowledge from thousands of wikis
  • The determinants of digital payment systems’ acceptance under cultural orientation differences: The case of uncertainty avoidance
  • Energy systems for climate change mitigation: A systematic review
  • Helpfulness prediction for online reviews with explicit content-rating interaction
  • Do advanced information technologies produce equitable government responses in coproduction: an examination of 311 systems in 15 US cities
  • The future (s) of digital agriculture and sustainable food systems: An analysis of high-level policy documents
  • A brief history of intelligent decision support systems
  • Trainable communication systems: Concepts and prototype
  • A survey of state-of-the-art approaches for emotion recognition in text
  • Empirical investigation of data analytics capability and organizational flexibility as complements to supply chain resilience
  • Autonomous litter surveying and human activity monitoring for governance intelligence in coastal eco-cyber-physical systems
  • Students’ perceptions on learning management systems of Arabic learning through blended learning model
  • Information technology–based tracing strategy in response to COVID-19 in South Korea—privacy controversies
  • On privacy of dynamical systems: An optimal probabilistic mapping approach
  • Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique
  • Game-based learning and gamification to improve skills in early years education
  • Developing Design Principles for Digital Platforms: An Agent-Based Modeling Approach
  • Processes, benefits, and challenges for adoption of blockchain technologies in food supply chains: a thematic analysis
  • Neural Fuzzy Based Intelligent Systems and
  • How agile software development methods reduce work exhaustion: Insights on role perceptions and organizational skills
  • Establishment of critical success factors for implementation of product lifecycle management systems
  • The ethical, legal and social implications of using artificial intelligence systems in breast cancer care
  • The ethical balance of using smart information systems for promoting the United Nations’ sustainable development goals. Sustainability 12: 4826
  • Quantum Information
  • Assessing the effectiveness of rural credit policy on the adoption of integrated crop-livestock systems in Brazil
  • Geographical tracking and mapping of coronavirus disease COVID-19/severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) epidemic and …
  • Problem-based learning and process modeling in teaching information systems
  • Semantics for Cyber-Physical Systems: A cross-domain perspective
  • Measuring User Perspectives on Website Conference Using System Usability Scale
  • A comprehensive review on indoor air quality monitoring systems for enhanced public health
  • Business process monitoring on blockchains: Potentials and challenges
  • A systematic literature review of sparsity issues in recommender systems
  • Special Issue Editorial–Accumulation and Evolution of Design Knowledge in Design Science Research: A Journey Through Time and Space
  • Ethics in telehealth: Comparison between guidelines and practice-based experience-the case for learning health systems
  • Machine learning in business process monitoring: A comparison of deep learning and classical approaches used for outcome prediction
  • PADS Arsenal: a database of prokaryotic defense systems related genes
  • A variational autoencoder solution for road traffic forecasting systems: Missing data imputation, dimension reduction, model selection and anomaly detection
  • Feedback driven improvement of data preparation pipelines
  • IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication
  • Digital transformation and the new logics of business process management
  • Detecting fraudulent accounts on blockchain: A supervised approach
  • Quarry: a user-centered big data integration platform
  • A theoretical framework for the evaluation of massive digital participation systems in urban planning
  • Gamifying knowledge sharing in humanitarian organisations: a design science journey
  • Massive access for future wireless communication systems
  • A systematic review of Community Engagement (CE) in Disaster Early Warning Systems (EWSs)
  • Anomaly detection in cyber-physical systems using machine learning
  • RFR-DLVT: a hybrid method for real-time face recognition using deep learning and visual tracking
  • Characterizing the propagation of situational information in social media during covid-19 epidemic: A case study on weibo
  • Moving beyond the direct impact of using CRM systems on frontline employees’ service performance: The mediating role of adaptive behaviour
  • A critical interpretive synthesis of the roles of midwives in health systems
  • Smart monitoring and controlling of government policies using social media and cloud computing
  • Advances in smart antenna systems for wireless communication
  • CAD for Control Systems
  • Diagnosis support systems for rare diseases: a scoping review
  • Agents and multi-agent systems as actor-networks
  • Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform
  • The effect of perceived similarity in dominance on customer self-disclosure to chatbots in conversational commerce
  • Developing web-based support systems for predicting poor-performing students using educational data mining techniques
  • A fuzzy performance evaluation model for government websites based on language property and balanced score card
  • An affective response model for understanding the acceptance of mobile payment systems
  • The impact of control styles and control modes on individual-level outcomes: a first test of the integrated IS project control theory
  • Towards Faithfully Interpretable NLP Systems: How should we define and evaluate faithfulness?
  • Joint transmit and reflective beamforming design for IRS-assisted multiuser MISO SWIPT systems
  • Drought risk to agricultural systems in Zimbabwe: A spatial analysis of hazard, exposure, and vulnerability
  • Dynamical systems and neural networks
  • A personal data store approach for recommender systems: enhancing privacy without sacrificing accuracy
  • A participatory approach based on stochastic optimization for the spatial allocation of Sustainable Urban Drainage Systems for rainwater harvesting.
  • Keeping Community in the Loop: Understanding Wikipedia Stakeholder Values for Machine Learning-Based Systems
  • The SOTA approach to engineering collective adaptive systems
  • Assessing risks of biases in cognitive decision support systems
  • An enhanced design of sparse autoencoder for latent features extraction based on trigonometric simplexes for network intrusion detection systems
  • A survey on methods for the safety assurance of machine learning based systems
  • Cloud-based in-memory columnar database architecture for continuous audit analytics
  • (Re) considering the concept of literature review reproducibility
  • Practice Makes Perfect: Lesson Learned from Five Years of Trial and Error Building Context-Aware Systems
  • Safety assurance mechanisms of collaborative robotic systems in manufacturing
  • Geographical landslide early warning systems
  • What Does PISA Tell Us About Performance of Education Systems?
  • On Using Physical Based Intrusion Detection in SCADA Systems
  • Digital innovation dynamics influence on organisational adoption: the case of cloud computing services
  • Bitcoin investment: a mixed methods study of investment motivations
  • Understanding the role of ICT and study circles in enabling economic opportunities: Lessons learned from an educational project in Kenya
  • Value cocreation for service innovation: Examining the relationships between service innovativeness, customer participation, and mobile app performance
  • An alumni assessment of MIS related job skill importance and skill gaps
  • Leveraging semantic and lexical matching to improve the recall of document retrieval systems: A hybrid approach
  • The Cyber Threats Analysis for Web Applications Security in Industry 4.0
  • Smart contracts for blockchain-based reputation systems: A systematic literature review
  • A survey of recent methods on deriving topics from Twitter: algorithm to evaluation
  • Modelling and predicting student’s academic performance using classification data mining techniques
  • The Role of National Health Information Systems in the Response to COVID-19
  • Epizootogical geo-information systems IOP Conf
  • Mapping and Geographic Information Systems (GIS)
  • Empowering MSMEs in the digital economy: role of accounting information systems
  • Regional Office for the Western Pacific. Developing Health Management Information Systems: A Practical Guide for Developing Countries. Manila: WHO …
  • Virtual Assistance in Any Context
  • Bayesian differential programming for robust systems identification under uncertainty
  • Distributed set-membership filtering for nonlinear systems subject to round-robin protocol and stochastic communication protocol over sensor networks
  • A literature review on question answering techniques, paradigms and systems
  • Architecture of the Security Access System for Information on the State of the Automatic Control Systems of Aircraft
  • Internal control systems and operating performance: Evidence from small and medium enterprises (SMEs) in Ondo state
  • Contact-tracing apps and alienation in the age of COVID-19
  • Quantum information processing with space-division multiplexing optical fibres
  • Evaluation of Gamification in E-Learning Systems for Elementary School Students
  • On the use of hierarchical fuzzy inference systems (HFIS) in expert-based landslide susceptibility mapping: the central part of the Rif Mountains (Morocco)
  • Online heart monitoring systems on the internet of health things environments: A survey, a reference model and an outlook
  • Blackboard systems for cognitive audition
  • Double-spending analysis of bitcoin
  • Performance degradation prediction of mechanical equipment based on optimized multi-kernel relevant vector machine and fuzzy information granulation
  • Do drones have a realistic place in a pandemic fight for delivering medical supplies in healthcare systems problems
  • Curiosity from the perspective of systems neuroscience
  • Vision statement: Interactive materials—Drivers of future robotic systems
  • Corecube: Core decomposition in multilayer graphs
  • Homomorphic encryption of supervisory control systems using automata
  • Indoor air quality monitoring systems for enhanced living environments: A review toward sustainable smart cities
  • Surprise: A python library for recommender systems
  • Consensus of multi-agent systems via fully distributed event-triggered control
  • Information-theoretic aspects of neural networks
  • How do interruptions affect user contributions on social commerce?
  • Identifying at-risk students based on the phased prediction model
  • Zero-Forcing Oriented Power Minimization for Multi-Cell MISO-NOMA Systems: A Joint User Grouping, Beamforming, and Power Control Perspective
  • Associations between two athlete monitoring systems used to quantify external training loads in basketball players
  • Topic modeling: a comprehensive review
  • Geometrical bounds of the irreversibility in Markovian systems
  • Sediment information on natural and anthropogenic-induced change of connected water systems in Chagan Lake, North China
  • BD-VTE: a novel baseline data based verifiable trust evaluation scheme for smart network systems
  • Cooperative CC–CV Charging of Supercapacitors Using Multicharger Systems
  • ECG monitoring systems: Review, architecture, processes, and key challenges
  • Estimating network effects in two-sided markets
  • Auditing news curation systems: A case study examining algorithmic and editorial logic in apple news
  • Extended dissipative sliding mode control for nonlinear networked control systems via event-triggered mechanism with random uncertain measurement
  • Enhancing transport properties in interconnected systems without altering their structure
  • Semi-automatic Eye Movement-Controlled Wheelchair Using Low-Cost Embedded System
  • Novel efficient RNN and LSTM-like architectures: Recurrent and gated broad learning systems and their applications for text classification
  • A survey of neural networks usage for intrusion detection systems
  • The development of stationary battery storage systems in Germany–A market review
  • Deep reinforcement learning for intelligent transportation systems: A survey
  • Code analysis for intelligent cyber systems: A data-driven approach
  • Smart management energy systems in industry 4.0
  • Trustworthiness in industrial IoT systems based on artificial intelligence
  • A grant-free random access scheme for M2M communication in massive MIMO systems
  • Responding to COVID-19: the UW medicine information technology services experience
  • Kypo4industry: A testbed for teaching cybersecurity of industrial control systems
  • Urban systems and the role of big data
  • Adjusting to epidemic-induced telework: empirical insights from teleworkers in France
  • GAN-driven personalized spatial-temporal private data sharing in cyber-physical social systems
  • A novel framework for backstepping-based control of discrete-time strict-feedback nonlinear systems with multiplicative noises
  • Blocksim: An extensible simulation tool for blockchain systems
  • Modeling and verification method for an early evaluation of Systems of Systems interactions
  • Path prediction in IoT systems through Markov Chain algorithm
  • 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions
  • Multiple writer retrieval systems based on language independent dissimilarity learning
  • District energy systems: Challenges and new tools for planning and evaluation
  • Framework for managing the COVID-19 infodemic: methods and results of an online, crowdsourced WHO technical consultation
  • From panopticon to heautopticon: A new form of surveillance introduced by quantified‐self practices
  • Assessing Novelty and Systems Thinking in Conceptual Models of Technological Systems
  • A many-objective optimization WSN energy balance model
  • Blockchain-based identity management systems: A review
  • Performance Evaluation of Snort and Suricata Intrusion Detection Systems on Ubuntu Server
  • Author’s approach to the topological modeling of parallel computing systems
  • A comparative analysis of tax systems in Russia and Germany
  • Machine learning force fields and coarse-grained variables in molecular dynamics: application to materials and biological systems
  • Coordination and management of cloud, fog and edge resources in SDN-VANETs using fuzzy logic: a comparison study for two fuzzy-based systems
  • Fuzzy test model for performance evaluation matrix of service operating systems
  • Deep context modeling for multi-turn response selection in dialogue systems
  • An expert system gap analysis and empirical triangulation of individual differences, interventions, and information technology applications in alertness of railroad …
  • Application of intelligent multi agent based systems for E-healthcare security
  • Hidden fuzzy information: Requirement specification and measurement of project provider performance using the best worst method
  • Photoferroelectric Thin Films for Flexible Systems by a Three‐in‐One Solution‐Based Approach
  • A cloud-edge based data security architecture for sharing and analysing cyber threat information
  • Adaptive Observer-Based Output Regulation of Multiagent Systems With Communication Constraints
  • A fault diagnosis method for power transmission networks based on spiking neural P systems with self-updating rules considering biological apoptosis …
  • Understanding massively multiplayer online role‐playing game addiction: A hedonic management perspective
  • Interoperability and integration testing methods for IoT systems: A systematic mapping study
  • Proxy tasks and subjective measures can be misleading in evaluating explainable ai systems
  • Emptransfo: A multi-head transformer architecture for creating empathetic dialog systems
  • The case of performance variability on dragonfly-based systems
  • IT reliability and its influence on the results of controlling: comparative analysis of organizations functioning in Poland and Switzerland
  • Worker stress in the age of mobile technology: The combined effects of perceived interruption overload and worker control
  • Fair Outlier Detection
  • Evaluation framework for smart disaster response systems in uncertainty environment
  • Distributed bipartite tracking consensus of nonlinear multi-agent systems with quantized communication
  • A decentralized artificial immune system for solution selection in cyber–physical systems
  • I am Me: Brain systems integrate and segregate to establish a multidimensional sense of self
  • Impacts of COVID-19 on agricultural and food systems worldwide and on progress to the sustainable development goals
  • Resource-efficient neural networks for embedded systems
  • COVID-19: challenges to GIS with big data
  • Transparency in complex computational systems
  • Practical synchronization in networks of nonlinear heterogeneous agents with application to power systems
  • A framework for sustainable contact tracing and exposure investigation for large health systems
  • Cyber-physical systems research and education in 2030: Scenarios and strategies
  • Web-based digital twin modeling and remote control of cyber-physical production systems
  • Efficiency creep and shadow innovation: enacting ambidextrous IT Governance in the public sector
  • Performance Based Planning of complex urban social-ecological systems: The quest for sustainability through the promotion of resilience
  • Anomaly detection in smart homes using bayesian networks
  • Improving recommender systems using co-appearing and semantically correlated user interests
  • Security policies and implementation issues
  • Identification of instantaneous anomalies in general aviation operations using energy metrics
  • Reinforcement learning in sustainable energy and electric systems: A survey
  • Cultural influence on e-government development
  • Thermodynamic resources in continuous-variable quantum systems
  • Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances
  • Quantum vs. classical information: operator negativity as a probe of scrambling
  • Dynamical and thermodynamical approaches to open quantum systems
  • Brain-inspired systems: A transdisciplinary exploration on cognitive cybernetics, humanity, and systems science toward autonomous artificial intelligence
  • Using semantic markup to boost context awareness for assistive systems
  • Authoritarianism, outbreaks, and information politics
  • Towards dynamic dependable systems through evidence-based continuous certification
  • Technologies and systems to improve mobility of visually impaired people: a state of the art
  • Clinical managers’ identity at the crossroad of multiple institutional logics in it innovation: The case study of a health care organization in England
  • Multi-agent direct current systems using renewable energy sources and hydrogen fuel cells
  • Interpretable confidence measures for decision support systems
  • Nonstationary control for TS fuzzy Markovian switching systems with variable quantization density
  • Mitigating the intrusive effects of smart home assistants by using anthropomorphic design features: A multimethod investigation
  • AoI-optimal joint sampling and updating for wireless powered communication systems
  • Machine learning based decision making for time varying systems: parameter estimation and performance optimization
  • A case study of agile software development for safety-Critical systems projects
  • The phishing funnel model: A design artifact to predict user susceptibility to phishing websites
  • Online display advertising markets: A literature review and future directions
  • Future prospects of information warfare and particularly psychological operations
  • Attacking machine learning systems
  • What is the relationship among positive emotions, sense of presence, and ease of interaction in virtual reality systems? An on-site evaluation of a commercial virtual …
  • Quantum computer systems for scientific discovery
  • Lizards in the Street! Introducing Cybersecurity Awareness in a Digital Literacy Context.
  • From microbial communities to distributed computing systems
  • Autonomous systems in anesthesia: Where do we stand in 2020? A narrative review
  • Balancing health privacy, health information exchange, and research in the context of the COVID-19 pandemic
  • Editor’s comments: The COVID-19 pandemic: Building resilience with IS research
  • Scenario-based development of intelligent transportation systems for road freight transport in Germany
  • Simulation in the design and operation of manufacturing systems: state of the art and new trends
  • Understanding adversarial attacks on deep learning based medical image analysis systems
  • Management of distributed energy systems on the basis of optimization methods and expert approaches
  • Breaking into the curriculum: The impact of information technology on schooling
  • Hybrid quantum systems with circuit quantum electrodynamics
  • The effects of high performance work systems in employees’ service-oriented OCB
  • Entanglement in indistinguishable particle systems
  • Integrated deep learning method for workload and resource prediction in cloud systems
  • Training or Synergizing? Complex Systems Principles Change the Understanding of Sport Processes
  • Intelligent forecasting with machine learning trading systems in chaotic intraday Bitcoin market
  • Effect of ground surface interpolation methods on the accuracy of forest attribute modelling using unmanned aerial systems-based digital aerial photogrammetry
  • The food systems in the era of the coronavirus (COVID-19) pandemic crisis
  • A qualitative content analysis of nurses’ comfort and employment of workarounds with electronic documentation systems in home care practice
  • From lurkers to workers: predicting voluntary contribution and community welfare
  • Formation-containment control of multi-robot systems under a stochastic sampling mechanism
  • Orbital angular momentum holography for high-security encryption
  • Using requirement-functional-logical-physical models to support early assembly process planning for complex aircraft systems integration
  • A flood risk assessment framework for interdependent infrastructure systems in coastal environments
  • Deepmaker: A multi-objective optimization framework for deep neural networks in embedded systems
  • A Framework for Risk Assessment in Collaborative Networks to Promote Sustainable Systems in Innovation Ecosystems
  • A survey on adversarial recommender systems: from attack/defense strategies to generative adversarial networks
  • Logistics Optimization of Agricultural Products Supply to the European Union Based on Modeling by Petri Nets
  • Perceived control and perceived risk in self-service technology recovery
  • Multisensorial generative and descriptive self-awareness models for autonomous systems
  • Distributed fusion filter for nonlinear multi-sensor systems with correlated noises
  • Improving the security of internet of things using cryptographic algorithms: A case of smart irrigation systems
  • Self-optimizing machining systems
  • EARL—Embodied agent-based robot control systems modelling language
  • MAMBA: A multi-armed bandit framework for beam tracking in millimeter-wave systems
  • Digital transformation of business ecosystems: Evidence from the Korean pop industry
  • Health care service delivery based on the Internet of things: A systematic and comprehensive study
  • A Genetic algorithm for multi-objective reconfiguration of balanced and unbalanced distribution systems in fuzzy framework
  • Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimisation algorithm in MANETs
  • New closed-loop insulin systems
  • Realization of AI-enhanced industrial automation systems using intelligent Digital Twins
  • Shadow systems in assessment: how supervisors make progress decisions in practice
  • TREC-COVID: rationale and structure of an information retrieval shared task for COVID-19
  • Data driven approach to risk management and decision support for dynamic positioning systems
  • Enterprise systems in transition economies: research landscape and framework for socioeconomic development
  • Tensors and compositionality in neural systems
  • Towards byzantine-resilient learning in decentralized systems
  • Compositional systems: overview and applications
  • Electrical Systems and Mechatronics
  • Separable multi‐innovation stochastic gradient estimation algorithm for the nonlinear dynamic responses of systems
  • Object detection with low capacity GPU systems using improved faster R-CNN
  • Teaching Software Engineering for Al-Enabled Systems
  • Introduction to the Theory of Radiopolarimetric Navigation Systems
  • Spatial disparities in coronavirus incidence and mortality in the United States: an ecological analysis as of May 2020
  • The neural and computational systems of social learning
  • Sample complexity of kalman filtering for unknown systems
  • Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: a system of systems problem
  • Systems of neutrosophic linear equations
  • Performance-Driven Analysis for an Adaptive Car-Navigation Service on HPC Systems
  • Early warning systems in biosecurity; translating risk into action in predictive systems for invasive alien species
  • Internet of things in sustainable energy systems
  • A polynomial-membership-function approach for stability analysis of fuzzy systems
  • Designing for ambient UX: design framework for managing user experience within cyber-physical systems
  • NNV: The neural network verification tool for deep neural networks and learning-enabled cyber-physical systems
  • Big Spatiotemporal Data Analytics: A research and innovation frontier
  • Navigating the gender structure in information technology: How does this affect the experiences and behaviours of women?
  • Water electrolysers with closed and open electrochemical systems
  • A Generic Network Compression Framework for Sequential Recommender Systems
  • Indoor positioning and wayfinding systems: a survey
  • Improve three-dimensional point localization accuracy in stereo vision systems using a novel camera calibration method
  • Mapping with unmanned aerial vehicles systems: A Case Study of Nevsehir Haci Bektas Veli University Campus
  • An overview of perception and decision-making in autonomous systems in the era of learning
  • Work design in future industrial production: Transforming towards cyber-physical systems
  • Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study
  • Applying process mining and semantic reasoning for process model customisation in healthcare
  • The mediating influence of smartwatch identity on deep use and innovative individual performance
  • An infrastructure for embedded systems using task scheduling
  • Geographic information research: Bridging the Atlantic
  • Method towards discovering potential opportunity information during cross-organisational business processes using role identification analysis within complex social …
  • An optimization approach for deployment of intelligent transportation systems wrong-way driving countermeasures
  • Extensions of prioritized weighted aggregation operators for decision-making under complex q-rung orthopair fuzzy information
  • Automated guided vehicle systems, state-of-the-art control algorithms and techniques
  • Developing theory through integrating human and machine pattern recognition
  • Multi-dimensional well-being associated with economic dependence on ecosystem services in deltaic social-ecological systems of Bangladesh
  • Architecture and Security of SCADA Systems: A Review
  • Black-box control for linear dynamical systems
  • Biologically Inspired Visual System Architecture for Object Recognition in Autonomous Systems
  • Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model
  • Security modelling and formal verification of survivability properties: Application to cyber–physical systems
  • Influence function based data poisoning attacks to top-n recommender systems
  • Memory-based continuous event-triggered control for networked TS fuzzy systems against cyber-attacks
  • Rational Mutual Interactions in Ternary Systems Enable High‐Performance Organic Solar Cells
  • Augmenting the algorithm: Emerging human-in-the-loop work configurations
  • Information radiation in BCFT models of black holes
  • Learning to localize: A 3D CNN approach to user positioning in massive MIMO-OFDM systems
  • Anesthetic management using multiple closed-loop systems and delayed neurocognitive recovery: a randomized controlled trial
  • Many Exciplex Systems Exhibit Organic Long‐Persistent Luminescence
  • Identification and categorization of factors affecting duration of post-disaster reconstruction of interdependent transportation systems
  • Singularity-free fixed-time fuzzy control for robotic systems with user-defined performance
  • Integration of digital twin and deep learning in cyber‐physical systems: towards smart manufacturing
  • HRM systems and employee affective commitment: the role of employee gender
  • Resilience for smart water systems
  • Architectural Models Enabled Dynamic Optimization for System-of-Systems Evolution
  • An effective method of systems requirement optimization based on genetic algorithms
  • Monitoring of farm-level antimicrobial use to guide stewardship: overview of existing systems and analysis of key components and processes
  • Using a ‘rich picture’to facilitate systems thinking in research coproduction
  • Deep reinforcement learning for the real time control of stormwater systems
  • Systems-based strategies to consider treatment costs in clinical practice
  • Vibrational mono-/bi-resonance and wave propagation in FitzHugh–Nagumo neural systems under electromagnetic induction
  • Digital twins in smart farming
  • Improved depth resolution and depth-of-field in temporal integral imaging systems through non-uniform and curved time-lens array
  • A blockchain use case in food distribution: Do you know where your food has been?
  • Determinants of cloud ERP adoption in Jordan: an exploratory study
  • The progress of multi-omics technologies: determining function in lactic acid bacteria using a systems level approach
  • Towards high performance living manufacturing systems-A new convergence between biology and engineering
  • Enterprise architecture implementation as interpersonal connection: Building support and commitment
  • Political communication on social media: A tale of hyperactive users and bias in recommender systems
  • PEtab—Interoperable specification of parameter estimation problems in systems biology
  • Architecting business process maps
  • An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
  • Highly-scalable traffic management of autonomous industrial transportation systems
  • Healthcare informatics and analytics in big data
  • Real-time incident prediction for online service systems
  • IoT-based smart irrigation systems: An overview on the recent trends on sensors and IoT systems for irrigation in precision agriculture
  • Fault-tolerant GNSS/SINS/DVL/CNS integrated navigation and positioning mechanism based on adaptive information sharing factors
  • Criticality evaluation to support maintenance management of manufacturing systems
  • Metamodelling in the information field
  • A Study of Accelerometer and Gyroscope Measurements in Physical Life-Log Activities Detection Systems
  • Coronavirus infections reported by ProMED, february 2000–january 2020
  • Digital healthcare: The only solution for better healthcare during COVID-19 pandemic?
  • Putting Teacher Evaluation Systems on the Map: An Overview of State’s Teacher Evaluation Systems Post-Every Student Succeeds Act.
  • The role of surrogate models in the development of digital twins of dynamic systems
  • Investigating potential factors associated with gender discrimination in collaborative recommender systems
  • New results on stabilization analysis for fuzzy semi-Markov jump chaotic systems with state quantized sampled-data controller
  • Detecting semantic bugs in autopilot software by classifying anomalous variables
  • Probabilistic framework to evaluate the resilience of engineering systems using Bayesian and dynamic Bayesian networks
  • Blockchain and machine learning for communications and networking systems
  • Advancing remote healthcare using humanoid and affective systems
  • Memory-event-trigger-based secure control of cloud-aided active suspension systems against deception attacks
  • Pollution potential and causative hydrogeochemical processes in unconfined aquifer systems in a typical urban setting: emphasis on recharge and discharge …
  • Data impact analysis in business processes
  • Coherence of accounting systems: transcendence of content and immunity of purpose
  • Sensor technologies for fall detection systems: A review
  • The combination of e-bike-sharing and demand-responsive transport systems in rural areas: A case study of Velenje
  • Convexified contextual optimization for on-the-fly control of smooth systems
  • Low-complexity channel estimation for circular and noncircular signals in virtual MIMO vehicle communication systems
  • Bipartite consensus for networked robotic systems with quantized-data interactions
  • Recursive parameter estimation methods and convergence analysis for a special class of nonlinear systems
  • L₁ control of positive semi-Markov jump systems with state delay
  • Brief survey on attack detection methods for cyber-physical systems
  • Information disclosure structure in supply chains with rental service platforms in the blockchain technology era
  • Extracting maritime traffic networks from AIS data using evolutionary algorithm
  • A time and energy saving-based frame adjustment strategy (TES-FAS) tag identification algorithm for UHF RFID systems
  • Automated systems for perioperative goal-directed hemodynamic therapy
  • Optimal estimation of low-rank factors via feature level data fusion of multiplex signal systems
  • The impact of COVID‐19 on food systems, safety, and security—a symposium report
  • Policy-driven neural response generation for knowledge-grounded dialogue systems
  • Event-based fault-tolerant control for networked control systems applied to aircraft engine system
  • Cyberphysical systems in the smart city: challenges and future trends for strategic research
  • High-power portable terahertz laser systems
  • Flourishing Systems Re-envisioning Infrastructure as a Platform for Human Flourishing
  • Event-triggered adaptive fuzzy control for stochastic nonlinear systems with unmeasured states and unknown backlash-like hysteresis
  • Self-testing of quantum systems: a review
  • Synthesizing Systems Biology Knowledge from Omics Using Genome‐Scale Models
  • Effective construction of classifiers with the k-NN method supported by a concept ontology
  • Towards a framework for capturing interpretability of hierarchical fuzzy systems-a participatory design approach
  • Trade-offs in online advertising: Advertising effectiveness and annoyance dynamics across the purchase funnel
  • Factors propelling the adoption of internet banking: the role of e-customer service, website design, brand image and customer satisfaction
  • MAPCAST: an Adaptive Control Approach using Predictive Analytics for Energy Balance in Micro-Grid Systems
  • Scalable reinforcement learning of localized policies for multi-agent networked systems
  • Spatial sparsity based secure transmission strategy for massive MIMO systems against simultaneous jamming and eavesdropping
  • Clustering-aided multi-view classification: A case study on Android malware detection
  • Analyzing situational awareness through public opinion to predict adoption of social distancing amid pandemic COVID‐19
  • Amino acids in freshwater food webs: Assessing their variability among taxa, trophic levels, and systems
  • How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service Systems
  • Integration of building service systems in architectural design.
  • Detailed Assessment of Embodied Carbon of HVAC Systems for a New Office Building Based on BIM
  • A risk perception analysis on the use of electronic payment systems by young adult
  • Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic
  • Improving the performance of process discovery algorithms by instance selection
  • 3D digital impression systems compared with traditional techniques in dentistry: A recent data systematic review
  • Information technology law
  • Combating COVID-19—The role of robotics in managing public health and infectious diseases
  • A survey on filtering issues for two-dimensional systems: Advances and challenges
  • Performance evaluation for manufacturing systems under control-limit maintenance policy
  • 6G and beyond: The future of wireless communications systems
  • Models for the development of multi-level gas supply systems
  • Security control of cyber-physical switched systems under round-robin protocol: input-to-state stability in probability
  • A compilation of UAV applications for precision agriculture
  • Hybrid Reciprocal Recommender Systems: Integrating Item-to-User Principles in Reciprocal Recommendation
  • The need to reconcile concepts that characterize systems facing threats
  • Torque and rotational speed sensor based on resistance and capacitive grating for rotational shaft of mechanical systems
  • The Digital Twin Paradigm for Smarter Systems and Environments: The Industry Use Cases
  • Big data and business analytics: A research agenda for realizing business value
  • Extended dissipativity asynchronous static output feedback control of Markov jump systems
  • Markov blankets, information geometry and stochastic thermodynamics
  • Football-specific validity of TRACAB’s optical video tracking systems
  • An approach based on mutually informed neural networks to optimize the generalization capabilities of decision support systems developed for heart failure prediction
  • Performance limits for fingerprinting-based indoor optical communication positioning systems exploiting multipath reflections
  • Akhmedjanov Karimjon Normative and methodological regulation of internal audit in the Republic of Uzbekistan
  • Disturbance-observer based consensus of linear multi-agent systems with exogenous disturbance under intermittent communication
  • LIMITS: Lightweight machine learning for IoT systems with resource limitations
  • Network device workload prediction: A data mining challenge at knowledge pit
  • Performance optimization of IoT based biological systems using deep learning
  • Spatial-temporal data-driven service recommendation with privacy-preservation
  • Stochastic Transceiver Optimization in Multi-Tags Symbiotic Radio Systems
  • Industrial cyber-physical systems-based cloud IoT edge for federated heterogeneous distillation
  • Industry 4.0 and the human factor–A systems framework and analysis methodology for successful development
  • Intelligent traffic control for autonomous vehicle systems based on machine learning
  • Dynamic pilot allocation scheme for joint user grouping and alliance game in massive MIMO systems
  • Comparing rapid scoring systems in mortality prediction of critically ill patients with novel coronavirus disease
  • Innovative IT use and innovating with IT: A study of the motivational antecedents of two different types of innovative behaviors
  • Joint multi-innovation recursive extended least squares parameter and state estimation for a class of state-space systems
  • Achievable rate optimization for MIMO systems with reconfigurable intelligent surfaces
  • Principles and practice of management
  • Probing effective wetting in subsurface systems
  • Structural Systems Theory: an overview of the last 15 years
  • Multidisciplinary and multifidelity framework for evaluating system-of-systems capabilities of unmanned aircraft
  • CSI feedback overhead reduction for 5g massive mimo systems
  • Channel estimation for extremely large-scale massive MIMO systems
  • Learning systems: Managing uncertainty in the new normal of COVID-19
  • Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems
  • State Machine Fault Protection Architecture for Aerospace Vehicle Guidance, Navigation, and Control
  • Optimizing ontology alignment in vector space
  • Intelligent and connected cyber-physical systems: A perspective from connected autonomous vehicles
  • Do‐it‐yourself closed‐loop systems for people living with type 1 diabetes
  • Development of a novel tool to support engagement with continuous glucose monitoring systems and optimize outcomes
  • BLCS: Brain-like based distributed control security in cyber physical systems
  • Speckle denoising techniques in imaging systems
  • Secure transmission designs for NOMA systems against internal and external eavesdropping
  • Memory-Efficient Learning of Stable Linear Dynamical Systems for Prediction and Control
  • Learning paradigms for communication and computing technologies in IoT systems
  • Thermodynamic uncertainty relation for general open quantum systems
  • Big Data analytics and Computational Intelligence for Cyber–Physical Systems: Recent trends and state of the art applications
  • Gait-based identification for elderly users in wearable healthcare systems
  • Coronavirus Disease 2019 (COVID-19): Interim Guidance for Emergency Medical Services (EMS) Systems and 911 Public Safety Answering Points (PSAPs) for …
  • Cyber-Physical Systems and Reliability Issues
  • Prediction of users’ professional profile in moocs only by utilising learners’ written texts
  • A roadmap to integrate astrocytes into Systems Neuroscience
  • COVID-19 and dengue, co-epidemics in Ecuador and other countries in Latin America: pushing strained health care systems over the edge
  • Actual issues of electronic commerce development in the republic of Uzbekistan
  • Thoughts on Using Systems Thinking to Develop Chemistry Students’ Professional Skills
  • Omics in systems biology: Current progress and future outlook
  • Robust beamforming design for intelligent reflecting surface aided MISO communication systems
  • Automated License Plate Recognition using Existing University Infrastructure and Different Camera Angles
  • Public budgeting systems
  • Fuzzy adaptive finite-time fault-tolerant control for strict-feedback nonlinear systems
  • Volt-VAR-Pressure Optimization of Integrated Energy Systems with Hydrogen Injection
  • Tracking urban geo-topics based on dynamic topic model
  • Detection of probe flow anomalies using information entropy and random forest method
  • Exploring the rhetoric of international professional communication: An agenda for teachers and researchers
  • A synergic framework for cyber-physical production systems in the context of Industry 4.0 and beyond
  • Electronic medical record systems: Decision support examination framework for individual, security and privacy concerns using multi-perspective analysis
  • Self-assembled extended π-systems for sensing and security applications
  • River toxicity assessment using molecular biosensors: Heavy metal contamination in the Turag-Balu-Buriganga river systems, Dhaka, Bangladesh
  • A novel adaptive fuzzy control for output constrained stochastic non-strict feedback nonlinear systems
  • Assessment Modeling: Fundamental Pre-training Tasks for Interactive Educational Systems
  • Fault detection for uncertain LPV systems using probabilistic set-membership parity relation
  • Information scrambling and loschmidt echo
  • Event-triggered fuzzy bipartite tracking control for network systems based on distributed reduced-order observers (revised manuscript of TFS-2019-1049)
  • Students’ use of learning management systems and desired e-learning experiences: are they ready for next generation digital learning environments?
  • Theoretical and experimental possibilities to set up some sensors systems involved in active safety process
  • Hyperparameter optimization in CNN for learning-centered emotion recognition for intelligent tutoring systems
  • Diet: Lightweight language understanding for dialogue systems
  • Clarify the physical process for fractional dynamical systems
  • Enterprise system lifecycle-wide innovation
  • Coverage, probability of SNR gain, and DOR analysis of RIS-aided communication systems
  • Gradient estimation algorithms for the parameter identification of bilinear systems using the auxiliary model
  • Neurobiology of systems memory consolidation
  • Use of apps in the COVID-19 response and the loss of privacy protection
  • Using the Systems Engineering Initiative for Patient Safety (SEIPS) model to describe critical care nursing during the SARS‐CoV‐2 pandemic (2020)
  • Semantics of the Black-Box: Can knowledge graphs help make deep learning systems more interpretable and explainable?
  • Robust finite-time fault-tolerant control for networked control systems with random delays: A Markovian jump system approach
  • Quantifying the impacts of climate change and extreme climate events on energy systems
  • Helping university students to choose elective courses by using a hybrid multi-criteria recommendation system with genetic optimization
  • A prospect theory-based QUALIFLEX for uncertain linguistic Z-number multi-criteria decision-making with unknown weight information
  • IBM Q Experience as a versatile experimental testbed for simulating open quantum systems
  • From smart farming towards agriculture 5.0: A review on crop data management
  • Optimal control in partially observable complex social systems
  • Determinant Factors’ Impact on Managerial Performance through Management Accounting Systems in Indonesia
  • Q (λ) learning-based dynamic route guidance algorithm for overhead hoist transport systems in semiconductor fabs
  • On course, but not there yet: Enterprise architecture conformance and benefits in systems development
  • Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
  • TyDi QA: A Benchmark for Information-Seeking Question Answering in Typologically Diverse Languages
  • Securing internet of medical things systems: limitations, issues and recommendations
  • Bridging entanglement dynamics and chaos in semiclassical systems
  • A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling
  • Compositional cyber-physical systems modeling
  • Photocatalytic and photoelectrochemical systems: similarities and differences
  • Modelling net-zero emissions energy systems requires a change in approach
  • Augmenting traffic signal control systems for urban road networks with connected vehicles

Research Topics Computer Science

Topic Covered

Top 10 research topics of Information Systems | list of research topics of Information Systems | trending research topics of Information Systems | research topics for dissertation in Information Systems | dissertation topics of Information Systems in pdf | dissertation topics in Information Systems | research area of interest Information Systems | example of research paper topics in Information Systems | top 10 research thesis topics of Information Systems | list of research thesis  topics of Information Systems| trending research thesis topics of Information Systems | research thesis  topics for dissertation in Information Systems | thesis topics of Information Systems in pdf | thesis topics in Information Systems | examples of thesis topics of Information Systems | PhD research topics examples of  Information Systems | PhD research topics in Information Systems | PhD research topics in computer science | PhD research topics in software engineering | PhD research topics in information technology | Masters (MS) research topics in computer science | Masters (MS) research topics in software engineering | Masters (MS) research topics in information technology | Masters (MS) thesis topics in Information Systems.

Related Posts:

  • Information Retrieval Research Topics for MS PhD
  • information visualization Research Topics Ideas [MS PhD]
  • Wireless Systems Research Topics ideas for MS PhD
  • Power Systems Research Topics Ideas for MS/PhD
  • Information Systems topics for presentation
  • Syllabus and MCQs of PPSC INFORMATION OFFICER IN INFORMATION & CULTURE DEPARTMENT 

412 Computers Topics & Essay Examples

🏆 best computers topic ideas & essay examples, 👍 good essay topics about computers, 💡 easy computer science essay topics, 🥇 computer science argumentative essay topics, 🎓 good research topics about computers, 🔍 interesting computer topics to write about, ❓ computer essay questions.

Looking for interesting topics about computer science? Look no further! Check out this list of trending computer science essay topics for your studies. Whether you’re a high school, college, or postgraduate student, you will find a suitable title for computer essay in this list.

  • Life Without Computers Essay One of the major contributions of the computer technology in the world has been the enhancement of the quality of communication.
  • How Computers Affect Our Lives In the entertainment industry, many of the movies and even songs will not be in use without computers because most of the graphics used and the animations we see are only possible with the help […]
  • Computer Use in Schools: Effects on the Education Field The learning efficiency of the student is significantly increased by the use of computers since the student is able to make use of the learning model most suited to him/her.
  • Advantages and Disadvantages of Computer Graphics Essay One is able to put all of his/her ideas in a model, carry out tests on the model using graphical applications, and then make possible changes.
  • The Causes and Effect of the Computer Revolution Starting the discussion with the positive effect of the issue, it should be stated that the implementation of the computer technologies in the modern world has lead to the fact that most of the processes […]
  • Are We Too Dependent on Computers? The duration taken to restore the machine varies depending on the cause of the breakdown, expertise of the repairing engineer and the resources needed to restore the machine.
  • Apex Computers: Problems of Motivation Among Subordinates In the process of using intangible incentives, it is necessary to use, first of all, recognition of the merits of employees.
  • Impact of Computers on Business This paper seeks to explore the impact of the computer and technology, as well as the variety of its aspects, on the business world.
  • Impact on Operations Resources of JIT at Dell Computer JIT inventory system stresses on the amount of time required to produce the correct order; at the right place and the right time.
  • Dependency on Computers For example, even the author of this paper is not only using the computer to type the essay but they are also relying on the grammar checker to correct any grammatical errors in the paper. […]
  • Impact of Computer Based Communication It started by explaining the impact of the internet in general then the paper will concentrate on the use of Instant Messaging and blogs.
  • Computer Technology: Evolution and Developments The development of computer technology is characterized by the change in the technology used in building the devices. The semiconductors in the computers were improved to increase the scale of operation with the development of […]
  • Are We Too Dependent on Computers? To reinforce this assertion, this paper shall consider the various arguments put forward in support of the view that computers are not overused. This demonstrates that in the education field, computers only serve as a […]
  • Computer’s Memory Management Memory management is one of the primary responsibilities of the OS, a role that is achieved by the use of the memory management unit.
  • Computer Hardware: Past, Present, and Future Overall, one can identify several important trends that profoundly affected the development of hardware, and one of them is the need to improve its design, functionality, and capacity.
  • Solutions to Computer Viruses Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged.
  • Pointing Devices of Human-Computer Interaction The footpad also has a navigation ball that is rolled to the foot to move the cursor on a computer screen.
  • Computers vs. Humans: What Can They Do? The differences between a human being and a computer can be partly explained by looking at their reaction to an external stimulus. To demonstrate this point, one can refer to chess computers that can assess […]
  • The Use of Computers in the Aviation Industry The complicated nature of the software enables the Autopilot to capture all information related to an aircraft’s current position and uses the information to guide the aircraft’s control system.
  • The Impact of Computer-Based Technologies on Business Communication The Importance of Facebook to Business Communication Facebook is one of the most popular social networking tools among college students and businesspersons. Blogs and Facebook can be used for the benefit of an organization.
  • Print and Broadcast Computer Advertisements The use of pictures and words to bring out the special features in any given computer and types of computers is therefore crucial in this type of advertisement because people have to see to be […]
  • Impact of Computer Technology on Economy and Social Life The rapid development of technologies and computer-human interactions influences not only the individual experience of a person but also the general conditions of social relations.
  • Resolving Software Problem: Timberjack Company The former thought that it would be more efficient to outline the scope and directions of the software project in just few pages and give it to specialists which would realize it.
  • How to Build a Computer? Preparation and Materials In order to build a personal computer, it is necessary to choose the performance that you want by considering the aspects such as the desired processor speed, the memory, and storage capacity. […]
  • Advantages of Using Computers at Work I have learned what I hoped to learn in that I have become more aware of the advantages of using computers and why I should not take them for granted.
  • Introduction to Human-Computer Interaction It is a scope of study that explores how individuals view and ponder about computer related technologies, and also investigates both the human restrictions and the features that advance usability of computer structures.
  • Human-Computer Interface in Nursing Practice HCI in the healthcare impacts the quality of the care and patients’ safety since it influences communication among care providers and between the latter and their clients.
  • Computers Will Not Replace Teachers On the other hand, real teachers can emotionally connect and relate to their students; in contrast, computers do not possess feeling and lack of empathy.
  • Challenges of Computer Technology Computer Technologies and Geology In fact, computer technologies are closely connected to any sphere of life, and it is not surprisingly that geology has a kind of dependence from the development of computers and innovative […]
  • Computer Network Types and Classification For a computer to be functional it must meet three basic requirements, which are it must provide services, communications and most of all a connection whether wireless or physical.the connection is generally the hardware in […]
  • Negative Impacts of Computer Technology For instance, they can erase human memory, enhance the ability of human memory, boost the effectiveness of the brain, utilize the human senses in computer systems, and also detect anomalies in the human body. The […]
  • The Drawbacks of Computers in Human Lives Since the invention of computers, they have continued to be a blessing in many ways and more specifically changing the lives of many people.
  • How Computer Works? In order for a computer to function, stuff such as data or programs have to be put through the necessary hardware, where they would be processed to produce the required output.
  • Computers Have Changed Education for the Better Considering the significant effects that computers have had in the educational field, this paper will set out to illustrate how computer systems have changed education for the better.
  • Use of Robots in Computer Science Currently, the most significant development in the field of computer science is the inclusion of robots as teaching tools. The use of robots in teaching computer science has significantly helped to endow students with valuable […]
  • Implementing Computer Assisted Language Learning (CALL) in EFL Classrooms CALL modifies the role of both the teacher and student in the process of language learning drastically. The implementation of CALL in EFL settings should enhance the learning outcomes of learners and facilitate the meeting […]
  • The American Military and the Evolution of Computer Technology From the Early 1940s to Early 1960s During the 1940s-1960, the American military was the only wouldriver’ of computer development and innovations.”Though most of the research work took place at universities and in commercial firms, military research organizations such as the Office […]
  • Dell Computer Corporation: Competitive Advantages Rivkin et al.claim that Dell remains a company to beat in the personal computer industry despite the initiatives the rival companies have taken.
  • Key Issues Concerning Computer Security, Ethics, and Privacy The issues facing computer use such as defense, ethics, and privacy continue to rise with the advent of extra ways of information exchange.
  • Doing Business in India: Outsourcing Manufacturing Activities of a New Tablet Computer to India Another aim of the report is to analyse the requirements for the establishment of the company in India, studying the competitors in the industry and their experience.
  • Mathematics as a Basis in Computer Science For example, my scores in physics and chemistry were also comparable to those I obtained in mathematics, a further testament to the importance of mathematics in other disciplines.
  • Computer System Review and Upgrade The main purpose of this computer program is going to be the more effective identification of the hooligan groups and their organisation with the purpose to reduce the violation actions.
  • Apple Inc.’s Competitive Advantages in Computer Industry Competitive advantage is significant in any company A prerequisite of success It enhances sustainable profit growth It shows the company’s strengths Apple Inc.explores its core competencies to achieve it Apple Inc.is led by Tim […]
  • Computer Network: Data Flow and Protocol Layering The diagram below shows a simplex communication mode Half-duplex mode is one in which the flow of data is multidirectional; that is, information flow in both directions.
  • Ethical and Illegal Computer Hacking For the ethical hackers, they pursue hacking in order to identify the unexploited areas or determine weaknesses in systems in order to fix them.
  • Computers R Us Company’s Customer Satisfaction The company uses a survey to draw data-driven conclusions about the current customer satisfaction level within the business and the strategies that will most effectively increase their customer satisfaction.
  • Hands-on Training Versus Computer Based Training From the above comparison of hands-on training and computer based training, it can be concluded that a company or an institution should choose its training methodology carefully.
  • Computers in Education: More a Boon Than a Bane Thus, one of the greatest advantages of the computer as a tool in education is the fact that it builds the child’s capacity to learn things independently.
  • Computer-Based Technologies That Assist People With Disabilities The visually impaired To assist the visually impaired to use computers, there are Braille computer keyboards and Braille display to enable them to enter information and read it. Most of these devices are very expensive […]
  • Computer Laboratory Staff and Their Work This will depend on the discretion of the staff to look into it that the rules that have been set in the system are followed dully. This is the work of the staff in this […]
  • Boot Process of a CISCO Router and Computer An understanding of the processes that would help in setting up the configuration of a router and its various elements can lead to relating the booting process of the router to that of any other […]
  • Computer-Based Systems Effective Implementation Under this methodology, there is a provision that gives attention to the needs of the people involved in the organization about the demands of the technology.
  • The Alliance for Childhood and Computers in Education Of course, there are certain benefits of computers and the abilities children may get, however, it is necessary to remember about the limits and pay enough attention to active life, healthy food, and real communication […]
  • Ethics in Computer Technology: Cybercrimes The first one is the category of crimes that are executed using a computer as a weapon. The second type of crime is the one that uses a computer as an accessory to the crime.
  • Computer-Based Communication Technology in Business Communication: Instant Messages and Wikis To solve the problems within the chosen filed, it is necessary to make people ready to challenges and provide them with the necessary amount of knowledge about IN and wikis’ peculiarities and properly explain the […]
  • Computer Technology in the Student Registration Process The registration process became more efficient due to the reduction in the number of registration staff because they are only tasked with the transfer of the students’ information to their respective departments.
  • Corporate Governance in Satyam Computer Services LTD The Chief Executive Officer of the company in the UK serves as the chairman of the board, but his/her powers are controlled by the other board members.
  • Computer-Aided Design in Knitted Apparel and Technical Textiles In doing so, the report provides an evaluation of the external context of CAD, a summary of the technology, and the various potential applications and recommendations of CAD.
  • Career Options for a Computer Programmer Once the system or software has been installed and is running, the computer programmer’s focus is on offering support in maintaining the system.
  • Computers and Transformation From 1980 to 2020 The humanity dreams about innovative technologies and quantum machines, allowing to make the most complicated mathematical calculations in billionths of a second but forgets how quickly the progress of computers has occurred for the last […]
  • Computer Security: Bell-Lapadula & Biba Models Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula and the Biba, to successfully ensure availability, integrity, and confidentiality of information flows via network access.
  • The Concept of Computer Hardware and Software The physical devices can still be the components that are responsible for the execution of the programs in a computer such as a microprocessor.
  • Use and Benefit of Computer Analysis The introduction of computers, therefore, has improved the level of service delivery and thus enhances convenience and comfort. Another benefit accruing from the introduction of computers is the ability of the world to manage networks […]
  • Bill Gates’ Contributions to Computer Technology Upon examination of articles written about Gates and quotations from Gates recounting his early childhood, several events stand out in significance as key to depicting the future potential of Gates to transform the world with […]
  • Computer Hardware Components and Functions Hardware is the physical components of a computer, while the software is a collection of programs and related data to perform the computers desired function.
  • Computers and Information Gathering On the other hand, it would be correct to say that application of computers in gathering information has led to negative impacts in firms.
  • Information Security Fundamentals: Computer Forensics In addition, the paper provides an overview of the techniques used in obtaining evidence from the internet and web resources, the types of evidence that can be recovered from electronic and computer resources, and the […]
  • HP Computer Marketing Concept The marketing concept is the criteria that firms and organizations use to meet the needs of their clients in the most conducive manner.
  • Computer Fraud and Contracting The law does not provide the consumers with measures to enforcing the online contracts because the argument is that, it is impossible to tell the intention and the consent of the consumer when they signed […]
  • Computer Sciences Technology: Smart Clothes In this paper we find that the smart clothes are dated back to the early 20th century and they can be attributed to the works of artists and scientists.
  • Building a PC, Computer Structure The choices available are Western Digital 320GB and Seagate 320GB and my advice would be to go for Western Digital as it is a good performer all along.
  • Keystone Computers & Networks Inc.’s Audit Plan The objectives of the audit are to identify and describe the objectives of the audit engagement and services that will be provided to the client by the audit team and to define the responsibilities of […]
  • Computer-Mediated Communication Aspects and Influences The development of computers and the ease of internet’s accessibility have played a vital role in improving the efficiency of communication.
  • Ethics and Computer Security The introduction of computers and the internet in the 1970s marked the end and the beginning of a new era where human labour was no longer required in the production of goods and services.
  • The Influence of Computer on the Living Standards of People All Over the World In the past, people considered computers to be a reserve for scientist, engineers, the army and the government. Media is a field that has demonstrated the quality and value of computers.
  • Purchasing and Leasing Computer Equipment, Noting the Advantages and Disadvantages of Each In fact, this becomes hectic when the equipment ceases to be used in the organization before the end of the lease period. First, they should consider how fast the equipment needs to be updated and […]
  • Effects of Computer Programming and Technology on Human Behavior Phones transitioned from the basic feature phones people used to own for the sole purpose of calling and texting, to smart phones that have amazing capabilities and have adapted the concepts of computers.
  • Levels of Computer Science and Programming Languages For the programmer to create low-level programming languages, computer architecture is very necessary for machine coding in the Central Processing Unit of a computer.
  • Computer-Based Learning and Virtual Classrooms E-learning adds technology to instructions and also utilizes technologies to advance potential new approaches to the teaching and learning process. However, e-learners need to be prepared in the case of a technology failure which is […]
  • Pipeline Hazards in Computer Architecture Therefore, branch instructions are the primary reasons for these types of pipeline hazards to emerge. In conclusion, it is important to be able to distinguish between different pipeline types and their hazards in order to […]
  • Computer Graphics and Its Historical Background One of the examples of analog computer graphics can be seen in the game called Space Warriors, which was developed at the Massachusetts Institute of Technology. Hence, the entertainment industry was one of the main […]
  • “Failure to Connect – How Computers Affect Our Children’s Minds and What We Can Do About It” by Jane M. Healy Detailed analysis of several chapters of the book will help to understand the impact of computer technologies on children’s health and mental development. To begin with, chapter 4 of the book deals with the impact […]
  • Human Mind Simply: A Biological Computer When contemplating the man-like intelligence of machines, the computer immediately comes to mind but how does the amind’ of such a machine compare to the mind of man?
  • Recommendations for Computer to Purchase This made me to look into and compare the different models of computers which can be good for the kind of work we do.
  • The Popularity of Esports Among Computer Gamers E-sports or cybersports are the new terms that can sound odd to the men in the street but are well-known in the environment of video gamers.
  • Strategic Marketing: Dell and ASUSTeK Computer Inc. Another factor contributing to the success of iPad is the use of stylish, supreme marketing and excellent branding of the products.
  • Online Video and Computer Games Video and computer games emerged around the same time as role playing games during the 1970s, and there has always been a certain overlap between video and computer games and larger fantasy and sci-fi communities.
  • Computer Problems: Review I was referred to the these three websites by my peers who told me they had experienced problems with their computers in the past and were of the opinion that these websites could provide me […]
  • How Computers Negatively Affect Student Growth Accessibility and suitability: most of the school and student do not have computers that imply that they cannot use computer programs for learning, lack of availability of internet facilities’ availability also makes the students lack […]
  • Computer-Based Information Systems The present essay will seek to discuss computer-based information systems in the context of Porter’s competitive strategies and offer examples of how computer-based information systems can be used by different companies to gain a strategic […]
  • Computer Technology in the Last 100 Years of Human History These communication tools are based on computer technology, and are the foundation of younger generations’ living. Computer technology is detrimental to the lives of younger generations because it fails.
  • Computer R Us Company: Initiatives for Improving Customer Satisfaction The result of the second question shows that the overall satisfaction of female customers is higher than that of male customers. Therefore, there is a need to improve the level of satisfaction of the male […]
  • Computer Aided Software Tools (CASE) The use of the repository is common to both the visual analyst and IBM rational software with varying differences evident on the utilization of services.
  • Computer-Based Testing: Beneficial or Detrimental? Clariana and Wallace found out that scores variations were caused by settings of the system in computer-based and level of strictness of examiners in paper-based. According to Meissner, use of computer based tests enhances security […]
  • Computer Viruses: Spreading, Multiplying and Damaging A computer virus is a software program designed to interfere with the normal computer functioning by infecting the computer operating system.
  • Introduction to Computer Graphics: Lesson Plans Students should form their own idea of computer graphics, learn to identify their types and features, and consider areas of application of the new direction in the visual arts.
  • How to Build a Gaming Computer The first step to creating a custom build for a PC is making a list of all the necessary components. This explanation of how to build a custom gaming computer demonstrates that the process is […]
  • PayPal and Human-Computer Interaction One of the strong points of the PayPal brand is its capacity to use visual design in the process of creating new users. The ability of the Paypal website to transform answers to the need […]
  • Computer Technology Use in Psychologic Assessment The use of software systems in the evaluation may lead a practitioner to misjudge and exceed their own competency if it gives the school psychologists a greater sense of safety.
  • Personal Computer: The Tool for Technical Report In addition to this, computers, via the use of reification, make it feasible to reconfigure a process representation so that first-time users can examine and comprehend many facets of the procedures.
  • Altera Quartus Computer Aided Design Tool So, the key to successful binary additions is a full adder. The complete adder circuit takes in three numbers, A, B, and C, adds them together, and outputs the sum and carry.
  • The Twelve-Cell Computer Battery Product: Weighted Average and Contracts Types There is a need to fully understand each of the choices, the cost, benefits, and risks involved for the individual or company to make the right decision.
  • How to Teach Elderly Relatives to Use the Computer The necessary safety information: Do not operate the computer if there is external damage to the case or the insulation of the power cables.
  • Computer Usage Evolution Through Years In the history of mankind, the computer has become one of the most important inventions. The diagnostics and treatment methods will be much easier with the help of computer intervention.
  • How to Change a Computer Hard Drive Disk These instructions will allow the readers to change the HDD from a faulty computer step by step and switch on the computer to test the new HDD.
  • Researching of Computer-Aided Design: Theory To draw a first-angle projection, one can imagine that the object is placed between the person drawing and the projection. To distinguish the first angle projection, technical drawings are marked with a specific symbol.
  • Systems Development Life Cycle and Implementation of Computer Assisted Coding The potential risks the software must deal with are identified at this phase in addition to other system and hardware specifications.
  • Why Is Speed More Important in Computer Storage Systems? While there are indications of how speed may be more significant than storage in the context of a computer system, both storage and speed are important to efficiency.
  • Researching of Computer Simulation Theory Until then, people can only continue to study and try to come to unambiguous arguments regarding the possibility of human life in a computer simulation.
  • Choosing a Computer for a Home Recording Studio The motherboard is responsible for the speed and stability of the system and should also have a large number of ports in case of many purposes of the computer in the studio.
  • Computer Programming and Code The Maze game was the one I probably enjoyed the most since it was both engaging and not challenging, and I quickly understood what I needed to do.
  • Computer-Aided-Design, Virtual and Augmented Realities in Business The usual applications of these technologies are in the field of data management, product visualization, and training; however, there is infinite potential in their development and integration with one another and this is why they […]
  • Getting to Know Laptop Computers This report aims to discuss the composition of a laptop computer and the purpose of each element. To summarize, a laptop possesses the same functions as a desktop computer but is smaller in size.
  • Computer-Mediated Communication Competence in Learning The study showed that knowledge of the CMC medium was the strongest influence on participation with a =.41. In addition to that, teachers can use the results of this study to improve students’ experience with […]
  • Anticipated Growth in Computer and Monitor Equipment Sales This presentations explores the computer equipment market to identify opportunities and device ways of using the opportunities to the advantage of EMI.
  • Current Trends and Projects in Computer Networks and Security That means the management of a given organization can send a request to communicate to the network the intended outcome instead of coding and executing the single tasks manually.
  • History of Computers: From Abacus to Modern PC Calculators were among the early machines and an example of this is the Harvard Mark 1 Early man was in need of a way to count and do calculations.
  • Acme Corp.: Designing a Better Computer Mouse The approach that the company is taking toward the early stages of the development process is to only include design engineers and brainstorm ideas.
  • Computer Forensic Incident All evidence should be collected in the presence of experts in order to avoid losing data as well as violating privacy rights.N.
  • Computer Science Courses Project Management Second, the selected independent reviewers analyze the proposal according to the set criteria and submit the information to the NSF. The project is crucial for the school and the community, as students currently do not […]
  • The Computer Science Club Project’s Budget Planning The budget for the program is provided in Table 1 below. Budget The narrative for the budget is provided below: The coordinator will spend 100% of his time controlling the quality of the provided services […]
  • How Computer Based Training Can Help Teachers Learn New Teaching and Training Methods The content will be piloted in one of the high schools, in order to use the teachers as trainers for a reaching more schools with the same methodology.
  • Approaches in Computer-Aided Design Process Challenges: The intricacy of the structure that resulted in the need to understand this process was the reason for this study.
  • Acquiring Knowledge About Computers One of the key features of A.I.U.’s learning platform is the use of the Gradebook. The best feature of the instant messaging tool is the fact that it is easy to install with no additional […]
  • Future of Forensic Accounting With Regards to Computer Use and CFRA There are different types of accounting; they include management accounting, product control, social accounting, non assurance services, resource consumption accounting, governmental accounting, project accounting, triple accounting, fund accounting and forensic accounting among others.
  • Computer Museum: Personal Experience While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
  • Computer-Based Search Strategy Using Evidence-Based Research Methodology In this case, the question guiding my research is “Can additional choices of food and places to eat improve appetite and maintain weight in residents with dementia?” The population in this context will be the […]
  • Recovering from Computer System Crashes In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
  • Effective Way to Handle a Computer Seizure Thus, it is important to device a method of investigation that may enhance the preservation and maintenance of the integrity of the evidence.
  • VisualDX: Human-Computer Interaction VisualDX is structured such that the user is guided through the steps of using the software system without having to be a software specialist.
  • Computer-Aided Software Engineering Tools Usage The inclusion of these tools will ensure that the time cycle is reduced and, at the same time, enhances the quality of the system.
  • Training Nurses to Work With Computer Technologies and Information Systems The educational need at this stage will be to enhance the ability of the learners to work with computer technologies and information system.
  • Computer Crime in the United Arab Emirates Computer crime is a new type of offense that is committed with the help of the computer and a network. This article aims at evaluating some of the laws established in the United Arab Emirates, […]
  • Computer Science: “DICOM & HL7” In the transport of information, DICOM recognizes the receiver’s needs such as understanding the type of information required. This creates some form of interaction between the sender and the receiver of the information from one […]
  • Computer Components in the Future It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat […]
  • Majoring in Computer Science: Key Aspects Computer Science, abbreviated as CS, is the study of the fundamentals of information and computation procedures and of the hands-on methods for the execution and application in computer systems.
  • How to Build a Desktop Personal Computer The processor will determine the speed of the system but the choice between the two major types-Intel and AMD- remains a matter of taste.
  • Networking Concepts for Computer Science Students The firewall, on the other hand, is a hardware or software that secures a network against external threats. Based on these a single subnet mask is sufficient for the whole network.
  • Trusted Computer System Evaluation Criteria The paper provides an overview of the concepts of security assurance and trusted systems, an evaluation of the ways of providing security assurance throughout the life cycle, an overview of the validation and verification, and […]
  • Advanced Data & Computer Architecture Solid knowledge and understanding of the information architecture, access, storage mechanisms and technologies, internet mechanisms, and systems administration contribute to the complete knowledge of the whole system architecture.
  • Computer Hardware: Structure, Purpose, Pros and Cons The main focus of the post is with respect to the security issues of web 2. 0 technologies is susceptible to is SQL injection attacks, which primarily entail the use of a code injection technique […]
  • Assessing and Mitigating the Risks to a Hypothetical Computer System The security of information is very important for the success of any organization and therefore should be given the first priority in the organization’s strategic plans.
  • Computer Technology: Databases Databases are components of Information Systems that are used when the Information Systems have large amounts of a, especially when the interfaces in the Information System are interactive, and when users can access the system […]
  • The Reduction in Computer Performance The Check Disk utility available in Windows XP enables one to monitor the health of the hard disk. This utility will analyze the disk and display actions that can be undertaken to recover disk space.
  • Advancements in Computer Science and Their Effects on Wireless Networks The most significant technological advancement witnessed in the 20th century was the expansion of World Wide Web in the 1990s. The wireless developments in the society have in addition greatly improved from the advent of […]
  • Choosing an Appropriate Computer System for the Home Use It looked at the history of how personal computers have evolved to become one of the most adopted gargets in businesses and the personal lives of many individuals.
  • Global Climate and Computer Science In an attempt to discover the role technology can play in the research of climate change, several approaches have been recommended by the UN’s Intergovernmental Panel on Climate Change.
  • Threats to Computer Users This calls for increased vigilance and awareness by these users, to protect the confidentiality and their data and personal information. In most cases, the links lead to duplicates of authentic sites and require the unsuspecting […]
  • Computer Network Security Legal Framework With the introduction of cloud computing, the need of data protection has been rising significantly within computer networks to facilitate the protection of Intellectual Property among the users.
  • Computer Forensics and Audio Data Retrieval Advanced technology in the modern society has contributed to the increase in computer and computer supported criminal activities due to the soaring increases in the number of internet users across the world and computerization of […]
  • Computer Sciences Technology: E-Commerce E-commerce is synonymous with e-business and entails the buying and selling of goods and services on the internet especially the World Wide Web.
  • Computer Forensics: Data Acquisition Data acquisition is a branch of computer forensics concerned with the retrieval of data originally located on a suspect medium such as a hard drive.
  • Computer Forensic Timeline Visualization Tool The necessity to save time in computer forensic investigations is the basis of the tool that Olssen and Boldt came up with.
  • Personal Computer Evolution Overview It is important to note that the first evolution of a personal computer occurred in the first century. This is because of the slowness of the mainframe computers to process information and deliver the output.
  • The Qatar Independence Schools’ Computer Network Security Control The result of the interviews mainly outlined several common themes and patterns in terms of the design of the proposed security system.
  • Human-Computer Interaction and Communication As the person is interacting with the gadgets or the computers, he should be favored by the design in that the system should be in such a way that it supports human usability.
  • Dependability of Computer Systems In the dependability on computer systems, reliability architects rely a great deal on statistics, probability and the theory of reliability. The purpose of reliability in computer dependability is to come up with a reliability requirement […]
  • Computer Sciences Technology: Influencing Policy Letter It is clear that the Electronic Communication Act is outdated and should be revised to account for the recent developments in technology.
  • Computer Control System in a Laboratory Setting In this case the iControl system is designed to control and monitor temperature variables of a hazardous liquid within a laboratory environment as well as other parameters such as smoke and light.
  • Property and Computer Crimes In United States, jurisdiction of kidnappers is based on the length and purpose of the kidnap, for example if one individual abducts another person for the purpose of ransom, such kind of a kidnap is […]
  • Current Laws and Acts That Pertain to Computer Security
  • Computer Network: Electronic Mail Server
  • Evolution of Computers in Commercial Industries and Healthcare
  • Honeypots and Honeynets in Network Security
  • Viruses and Worms in Computers
  • The Life, Achievement, and Legacy to Computer Systems of Bill Gates
  • Life, Achievement, and Legacy to Computer Systems of Alan Turing
  • Computer Sciences Technology and HTTPS Hacking Protection
  • Protecting Computers From Security Threats
  • Computer Sciences Technology: Admonition in IT Security
  • Overview of Computer Languages – Python
  • Research Tools Used by Computer Forensic Teams
  • Maintenance and Establishment of Computer Security
  • Computer Tech Company’s Medical Leave Problem
  • Sales Plan for Computer Equipment
  • Smartwatches: Computer on the Wrist
  • Purpose of the Computer Information Science Course
  • How to Sell Computers: PC Type and End User Correlation
  • Technological Facilities: Computers in Education
  • Computers’ Critical Role in Modern Life
  • The Five Developments of the Computers
  • History of the Personal Computer: From 1804 to Nowadays
  • Malware: Code Red Computer Worm
  • Sidetrack Computer Tech Business Description
  • Strayer University’s Computer Labs Policy
  • Computers Brief History: From Pre-Computer Hardware to Modern Computers
  • Computer Assisted Language Learning in English
  • Shaping and Profiting From the Computer Revolution: Bill Gates
  • TUI University: Computer Capacity Evaluation
  • The Effectiveness of the Computer
  • Computers: The History of Invention and Development
  • Quasar Computers Company’s Economic Strategies
  • Computer Security System: Identity Theft
  • Analogical Reasoning in Computer Ethics
  • Computer Security: Intrusion Detection System Policy
  • Dell Computer Corporation: Management Control System
  • Computer Mediated Communication Enhance or Inhibit
  • Technical Communication: Principles of Computer Security
  • How Computers Have Changed the Way People Communicate
  • Principles of Computer Security
  • Why to Choose Mac Over Windows Personal Computer
  • Biometrics and Computer Security
  • Computer Addiction: Side Effects and Possible Solutions
  • Marketing: Graphic and Voice Capabilities of a Computer Software Technology
  • “ESL Students’ Computer-Mediated Communication Practices” by Dong Shin
  • Computer Systems: Technology Impact on Society
  • State-Of-The-Art in Computer Numerical Control
  • The Increasing Human Dependence on Computers
  • Computer Adventure Games Analysis
  • Legal and Ethical Issues in Computer Security
  • The Research of Computer Assisted Instructions
  • Mind, Brains, and Computer: Homunculus Theories
  • Computer and Information Tech Program in Education
  • Computer Software and Wireless Information Systems
  • Growing Compatibility Issues: Computers and User Privacy
  • Computer Vision: Tracking the Hand Using Bayesian Models
  • Computer Virus User Awareness
  • Modern Portable Computer – Battery Technology, LCD Displays, Low-Power CPUs
  • Firewalls in Computer Security
  • Computer Financial Systems and the Labor Market
  • Computer Engineer Stephen Wozniak
  • Gaming System for Dell Computer: Media Campaign Issues
  • Computers: Science and Scientists Review
  • Uniform Law for Computer Information Transactions
  • Computer Science. Open Systems Interconnection Model
  • Personal Computer and Social Media Security
  • Apple Inc. and Computer Market
  • Computer Forensics in Criminal Investigation
  • Computer Crimes: Viewing the Future
  • Computer Forensics and Cyber Crime
  • Computer Forensics: Identity Theft
  • Computer Crime Investigation Processes and Analyses
  • Computer Forensics Tools and Evidence Processing
  • Dam Computers Company’s Strategic Business Planning
  • Computer and Internet Security Notions
  • Technical Requirements for Director Computer Work
  • Internship in the Computer Service Department
  • Allocating a Personal Computer
  • Graphical Communication and Computer Modeling
  • Computers and Web 2.0
  • Computer Games and Instruction
  • Zayed University’s Computer Security Internship
  • Memex and Dynabook as Early Portable Computers
  • IBM.com Website and Human-Computer Interaction
  • IBM Website and Human-Computer Interaction
  • Computer Hardware and Software Policies for Schools
  • Education Goals in Computer Science Studies
  • Enhancing Sepsis Collaborative: Computer Documentation
  • Apple Ipad: History of the Tablet Computers and Their Connection to Asia
  • Computer Emergency Readiness Team
  • Computer Literacy: Parents and Guardians Role
  • Computer Viruses, Their Types and Prevention
  • Computers in Security, Education, Business Fields
  • Graph Theory Application in Computer Science
  • Epistemic Superiority Over Computer Simulations
  • Computer Crimes and Internet Security
  • The History of Computer Storage
  • Personal Computers and Protection of Privacy
  • Fertil Company’s Computer and Information Security
  • Computer-Assisted Language Learning: Barriers
  • Computer-Assisted Second Language Learning Tools
  • Computer-Supported Collaborative Learning
  • Computer Assisted Language Learning in L2 Education
  • Computer-Assisted English Language Learning
  • Computer Gaming Influence on the Academic Performance
  • Computer Evolution, Its Future and Societal Impact
  • Computer Based Learning in Elementary Schools
  • Human Computer Interaction: Types of Special Needs
  • PowerPoint Computer Program: Principles and Processes
  • Computer and Digital Forensics and Cybercrimes
  • Online and Computer-Based Technology Issues
  • Computer Reservations System in Hotel
  • VSphere Computer Networking: Planning and Configuring
  • Human Computer Interaction in Web Based Systems
  • Cybercrime, Digital Evidence, Computer Forensics
  • Human Overdependence on Computers
  • Medical Uses of Computer-Mediated Communication
  • Computer Architecture for a College Student
  • Human-Computer Interaction in Health Care Settings
  • Personal Computers in the U.S. Market
  • HP Company’s Computer Networking Business
  • Foreign Direct Investment in the South Korean Computer Industry
  • Computer Mediated Interpersonal and Intercultural Communication
  • Computer Apps for Productive Endeavors of Youth
  • Computer Security and Computer Criminals
  • Dell Computers Company Planning and Organization
  • Humanities and Computer Science Collaboration
  • Globalization Influence on the Computer Technologies
  • Euro Computer Systems and Order Fulfillment Center Conflict
  • Computer Science Program in Colleges and Universities
  • Computer Science: Threats to Internet Privacy
  • EFL and ESL Learners: Computer-Aided Cooperative Learning
  • Design and Installation of a Computer Network
  • Computer Science Corporation Service Design
  • Melissa Virus and Its Effects on Computers
  • Computer Security – Information Assurance
  • How Computers Work: Components and Power
  • Computer Mediated Learning
  • Environmental Friendly Strategy for Quality Computers Limited
  • Human-Computer Interaction: Tangible Video Bubbles
  • “Interaction” in Human Computer Interaction: iPad’s Design Framework
  • Corporate Governance: Satyam Computer Service Limited
  • Quasar Company’s Optical Computers
  • Computer Adaptive Testing and Using Computer Technology
  • Computer Games: Morality in the Virtual World
  • How Computer Based Training Can Help Teachers Learn New Teaching and Training Methods
  • Human Computer Interaction – Heptic Technology in PlayMotion
  • Apple Computer, Inc.: Maintaining the Music Business
  • Computer Forensics and Digital Evidence
  • Human Computer Interface: Evolution and Changes
  • The Usefulness of Computer Networks for Students
  • Computer and Digital Music Players Industry: Apple Inc. Analysis
  • Computer Manufacturer: Apple Computer Inc.
  • Theft of Information and Unauthorized Computer Access
  • Supply Chain Management at Dell Computers
  • Turing Test From Computer Science
  • The Computer-Mediated Learning Module
  • Computer Security and Its Main Goals
  • Apple Computer Inc. – History and Goals of This Multinational Corporation
  • Computer Technology in Education
  • Telecommunication and Computer Networking in Healthcare
  • The Convergence of the Computer Graphics and the Moving Image
  • Computer Forensics Related Ethics
  • Microsoft Operating System for Personal Computers a Monopoly in the Markets
  • Dell Computer Company and Michael Dell
  • People Are Too Dependent on Computers
  • Computer-Mediated Communication: Study Evaluation
  • Computer Assisted Language Learning in the Middle East
  • Apple Computer, Inc. Organizational Culture and Ethics
  • Computer-Based Information Systems and E-Business Strategy
  • Analyses and Model Forms: Computer Sciences Corporation Case Study
  • Computer Sciences Corporation: Michael Horton
  • Review: “Computers Learn to Listen, and Some Talk Back” by Lohr and Markoff
  • The Role of Computer Forensics in Criminology
  • Paralinguistic Cues in Computer-Mediated Communications in Personality Traits
  • Computer-Mediated Communication
  • Comparison of Three Tablet Computers: Ipad2, Motorola Xoom and Samsung Galaxy
  • Decker Computers: E-Commerce Website App
  • Apple Computer Inc. Marketing
  • The Future of Human Computer Interface and Interactions
  • Third Age Living and Computer Technologies in Old Age Learning
  • Human-Computer Interaction in Health Care
  • Computer Technology and Networked Organizations
  • Computer System Electronic Components
  • Security of Your Computer and Ways of Protecting
  • Computer Safety: Types and Technologies
  • Reflections and Evaluations on Key Issues Concerning Computer
  • ClubIT Computer Company: Information and Technology Solutions
  • The Impact of Computers
  • Tablet PCs Popularity and Application
  • Computer Addiction in Modern Society
  • The Evolution of the Personal Computer and the Internet
  • Advancement of the Computer: Microchips and Semiconductors
  • Computers in the Classroom: Pros and Cons
  • Computer Cookies: What Are They and How Do They Work
  • Modeling, Prototyping and CASE Tools: The Inventions to Support the Computer Engineering
  • Ergotron Inc Computer Workstation Environment
  • Experts Respond to Questions Better Than Computers
  • Through a Computer Display and What People See There: Communication Technologies and the Quality of Social Interactions
  • Computer Based Training Verses Instructor Lead Training
  • Social Implications of Computer Technology: Cybercrimes
  • Leasing Computers at Persistent Learning
  • Tablet Computer Technology
  • Ethics in Computer Hacking
  • Computer Forensics and Investigations
  • Preparing a Computer Forensics Investigation Plan
  • Basic Operations of Computer Forensic Laboratories
  • Information Technology: Computer Software
  • Project Management and Computer Charting
  • HP: Arguably the Best Computer Brand Today
  • Computer Networks and Security
  • The Computer Microchip Industry
  • Computer Technician and Labor Market
  • Network Security and Its Importance in Computer Networks
  • Company Analysis: Apple Computer
  • Preparation of Correspondences by Typewriters and Computers
  • Responsibilities of Computer Professionals to Understanding and Protecting the Privacy Rights
  • Computers & Preschool Children: Why They Are Required in Early Childhood Centers
  • Computer and Telecommunication Technologies in the Worlds’ Economy
  • Computer Survey Analysis: Preferences of the People
  • Computer Security: Safeguard Private and Confidential Information
  • Writing Argumentative Essay With Computer Aided Formulation
  • Computer Communication Network in Medical Schools
  • Computer Systems in Hospital
  • Introduction to Computers Malicious Software (Trojan Horses)
  • Computer Security Breaches and Hacking
  • Purchasing or Leasing Computer Equipment: Advantages and Disadvantages
  • State Laws Regarding Computer Use and Abuse
  • Apple Computer: The Twenty-First Century Innovator
  • Computer Crimes Defense and Prevention
  • Concept and Types of the Computer Networks
  • How Have Computers Changed the Wage Structure?
  • Do Computers and the Internet Help Students Learn?
  • How Are Computers Used in Pavement Management?
  • Are Americans Becoming Too Dependent on Computers?
  • How Are Data Being Represented in Computers?
  • Can Computers Replace Teachers?
  • How Did Computers Affect the Privacy of Citizens?
  • Are Computers Changing the Way Humans Think?
  • How Are Computers and Technology Manifested in Every Aspect of an American’s Life?
  • Can Computers Think?
  • What Benefits Are Likely to Result From an Increasing Use of Computers?
  • How Are Computers Essential in Criminal Justice Field?
  • Are Computers Compromising Education?
  • How Are Computers Used in the Military?
  • Did Computers Really Change the World?
  • How Have Computers Affected International Business?
  • Should Computers Replace Textbooks?
  • How Have Computers Made the World a Global Village?
  • What Are the Advantages and Disadvantages for Society of the Reliance on Communicating via Computers?
  • Will Computers Control Humans in the Future?
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2024, February 26). 412 Computers Topics & Essay Examples. https://ivypanda.com/essays/topic/computers-essay-topics/

"412 Computers Topics & Essay Examples." IvyPanda , 26 Feb. 2024, ivypanda.com/essays/topic/computers-essay-topics/.

IvyPanda . (2024) '412 Computers Topics & Essay Examples'. 26 February.

IvyPanda . 2024. "412 Computers Topics & Essay Examples." February 26, 2024. https://ivypanda.com/essays/topic/computers-essay-topics/.

1. IvyPanda . "412 Computers Topics & Essay Examples." February 26, 2024. https://ivypanda.com/essays/topic/computers-essay-topics/.

Bibliography

IvyPanda . "412 Computers Topics & Essay Examples." February 26, 2024. https://ivypanda.com/essays/topic/computers-essay-topics/.

  • Cyber Security Topics
  • Electronics Engineering Paper Topics
  • Virtualization Essay Titles
  • Dell Topics
  • Intel Topics
  • Microsoft Topics
  • Apple Topics

ORIGINAL RESEARCH article

This article is part of the research topic.

Machine Learning and Immersive Technologies for User-centered Digital Healthcare Innovation

Towards the Design of Persuasive Systems for a Healthy Workplace: A Real Time Posture Detection Provisionally Accepted

  • 1 Academic City University College, Ghana
  • 2 Dalhousie University, Canada

The final, formatted version of the article will be published soon.

Persuasive technologies, in connection with human factor engineering requirements for healthy workplaces, have played a significant role in ensuring a change in human behavior. Healthy workplaces suggest different best practices applicable to body posture, proximity to the computer system, movement, lighting conditions, computer system layout, and other significant psychological and cognitive aspects. In this study, we explored body posture in line with best and healthy practices that suggest how users should sit or stand in workplaces. We found that most unhealthy postures have a long-term impact on the lifestyle and health of computer users. Besides, people work long or short hours on the computer system and have become less conscious of essential best practices. Though most persuasive studies are now beginning to provide reminders to computer users to take regular breaks from their computer systems, little attention has been paid to making computers responsive to computer users’ unhealthy workplace practices based on their bad postures. Given the significance of deep learning models in real-time object detection, we employed these models to support real-time detection in response to the unhealthy practices of computer users. Hence, this paper provides a real-time posture detection framework based on two deep learning models: convolutional neural networks (CNN) and Yolo-V3. Results show that our YOLO-V3 model outperformed CNN model with a mean average precision of 92%. Based on this finding, we provide implications for integrating proximity detection and designing persuasive systems for a healthy workplace in the future.

Keywords: Persuasive Technology, Healthy workplace, Posture, machine learning, YOLO-V3, Convolutional Neural Networks

Received: 22 Dec 2023; Accepted: 10 May 2024.

Copyright: © 2024 ATAGUBA and Orji. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY) . The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Dr. GRACE ATAGUBA, Academic City University College, Accra, Ghana

People also looked at

ScienceDaily

New machine learning algorithm promises advances in computing

Digital twin models may enhance future autonomous systems.

Systems controlled by next-generation computing algorithms could give rise to better and more efficient machine learning products, a new study suggests.

Using machine learning tools to create a digital twin, or a virtual copy, of an electronic circuit that exhibits chaotic behavior, researchers found that they were successful at predicting how it would behave and using that information to control it.

Many everyday devices, like thermostats and cruise control, utilize linear controllers -- which use simple rules to direct a system to a desired value. Thermostats, for example, employ such rules to determine how much to heat or cool a space based on the difference between the current and desired temperatures.

Yet because of how straightforward these algorithms are, they struggle to control systems that display complex behavior, like chaos.

As a result, advanced devices like self-driving cars and aircraft often rely on machine learning-based controllers, which use intricate networks to learn the optimal control algorithm needed to best operate. However, these algorithms have significant drawbacks, the most demanding of which is that they can be extremely challenging and computationally expensive to implement.

Now, having access to an efficient digital twin is likely to have a sweeping impact on how scientists develop future autonomous technologies, said Robert Kent, lead author of the study and a graduate student in physics at The Ohio State University.

"The problem with most machine learning-based controllers is that they use a lot of energy or power and they take a long time to evaluate," said Kent. "Developing traditional controllers for them has also been difficult because chaotic systems are extremely sensitive to small changes."

These issues, he said, are critical in situations where milliseconds can make a difference between life and death, such as when self-driving vehicles must decide to brake to prevent an accident.

The study was published recently in Nature Communications.

Compact enough to fit on an inexpensive computer chip capable of balancing on your fingertip and able to run without an internet connection, the team's digital twin was built to optimize a controller's efficiency and performance, which researchers found resulted in a reduction of power consumption. It achieves this quite easily, mainly because it was trained using a type of machine learning approach called reservoir computing.

"The great thing about the machine learning architecture we used is that it's very good at learning the behavior of systems that evolve in time," Kent said. "It's inspired by how connections spark in the human brain."

Although similarly sized computer chips have been used in devices like smart fridges, according to the study, this novel computing ability makes the new model especially well-equipped to handle dynamic systems such as self-driving vehicles as well as heart monitors, which must be able to quickly adapt to a patient's heartbeat.

"Big machine learning models have to consume lots of power to crunch data and come out with the right parameters, whereas our model and training is so extremely simple that you could have systems learning on the fly," he said.

To test this theory, researchers directed their model to complete complex control tasks and compared its results to those from previous control techniques. The study revealed that their approach achieved a higher accuracy at the tasks than its linear counterpart and is significantly less computationally complex than a previous machine learning-based controller.

"The increase in accuracy was pretty significant in some cases," said Kent. Though the outcome showed that their algorithm does require more energy than a linear controller to operate, this tradeoff means that when it is powered up, the team's model lasts longer and is considerably more efficient than current machine learning-based controllers on the market.

"People will find good use out of it just based on how efficient it is," Kent said. "You can implement it on pretty much any platform and it's very simple to understand." The algorithm was recently made available to scientists.

Outside of inspiring potential advances in engineering, there's also an equally important economic and environmental incentive for creating more power-friendly algorithms, said Kent.

As society becomes more dependent on computers and AI for nearly all aspects of daily life, demand for data centers is soaring, leading many experts to worry over digital systems' enormous power appetite and what future industries will need to do to keep up with it.

And because building these data centers as well as large-scale computing experiments can generate a large carbon footprint, scientists are looking for ways to curb carbon emissions from this technology.

To advance their results, future work will likely be steered toward training the model to explore other applications like quantum information processing, Kent said. In the meantime, he expects that these new elements will reach far into the scientific community.

"Not enough people know about these types of algorithms in the industry and engineering, and one of the big goals of this project is to get more people to learn about them," said Kent. "This work is a great first step toward reaching that potential."

This study was supported by the U.S. Air Force's Office of Scientific Research. Other Ohio State co-authors include Wendson A.S. Barbosa and Daniel J. Gauthier.

  • Electronics
  • Telecommunications
  • Energy Technology
  • Computers and Internet
  • Neural Interfaces
  • Information Technology
  • Computer Science
  • Artificial intelligence
  • Alan Turing
  • Computing power everywhere
  • Grid computing
  • Data mining

Story Source:

Materials provided by Ohio State University . Original written by Tatyana Woodall. Note: Content may be edited for style and length.

Journal Reference :

  • Robert M. Kent, Wendson A. S. Barbosa, Daniel J. Gauthier. Controlling chaos using edge computing hardware . Nature Communications , 2024; 15 (1) DOI: 10.1038/s41467-024-48133-3

Cite This Page :

Explore More

  • Planet Glows With Molten Lava
  • A Fragment of Human Brain, Mapped
  • Symbiosis Solves Long-Standing Marine Mystery
  • Surprising Common Ideas in Environmental ...
  • 2D All-Organic Perovskites: 2D Electronics
  • Generative AI That Imitates Human Motion
  • Hunting the First Stars
  • Kids' Sleep Problems Linked to Later Psychosis
  • New-To-Nature Enzyme Containing Boron Created
  • New Target for Potential Leukemia Therapy

Trending Topics

Strange & offbeat.

IMAGES

  1. (PDF) Essay on the understanding of computer & systems sciences

    computer information systems research paper topics

  2. ️ Computer related research paper topics. Research Paper Topics. 2019-02-22

    computer information systems research paper topics

  3. 🔥 Research topics related to information technology. 130+ Best

    computer information systems research paper topics

  4. (PDF) INTRODUCING DATA VISUALIZATION TECHNIQUES IN COMPUTER INFORMATION

    computer information systems research paper topics

  5. INFORMATION SYSTEMS research paper final.docx

    computer information systems research paper topics

  6. (PDF) Qualitative Research Methods for Evaluating Computer Information

    computer information systems research paper topics

VIDEO

  1. How to read a Research Paper ? Made easy for young researchers

  2. Computer Information Systems (CIS) Explained in 5 Minutes

  3. computer based information systems// significance and types of information systems

  4. BIS 3233

  5. Overview on Information Systems Research Methods (21:54 minutes)

  6. Top 10 Best Computer Science Research Topics

COMMENTS

  1. 130 Top-Notch Information Technology Research Topics

    130 Information Technology Research Topics And Quick Writing Prompts. The field of information technology is one of the most recent developments of the 21st century. Scholars argue that we are living in a technological age. Despite this buzz, however, many students still find it challenging to compose an information technology research topic.

  2. Information Systems Research

    ISR has issued a call for papers for a special issue on Analytical Creativity. ScholarOne will be open to submissions beginning on January 2, 2024. The deadline for submissions is January 31, 2024. Additional information can be found here. Information Systems Research is a peer-reviewed journal that seeks to publish the best research in the ...

  3. Top 400 Information Technology Research Topics

    The list of the top 400 information technology research topics is organized into different categories. Let's examine it. Artificial Intelligence (AI) and Machine Learning (ML) Easy AI: Explaining and Using. Group Learning: Getting Better Together. AI in Health: Diagnosing and Helping. Robots Learning on Their Own.

  4. 150+ Research Paper Topics For Information Technology

    Information Technology Research Paper Topics for College Students. ... The application of computer systems or devices to retrieve information is known as information technology (IT). Information technology is responsible for so much of our labour, corporate operations, and personal access to information that it accounts for a substantial ...

  5. Computer Technology Research Paper Topics

    This list of computer technology research paper topics provides the list of 33 potential topics for research papers and an overview article on the history of computer technology.. 1. Analog Computers. Paralleling the split between analog and digital computers, in the 1950s the term analog computer was a posteriori projected onto pre-existing classes of mechanical, electrical, and ...

  6. Journal of Computer Information Systems

    The Journal of Computer Information Systems (JCIS) aims to publish manuscripts that explore information systems and technology research and thus develop computer information systems globally. ... Quickly and easily track the impact your paper makes with the help of Authored Works. Publication office: Taylor & Francis, Inc., 530 Walnut Street ...

  7. Computer Science Research Topics (+ Free Webinar)

    If you've landed on this post, chances are you're looking for a computer science-related research topic, but aren't sure where to start. Here, we'll explore a variety of CompSci & IT-related research ideas and topic thought-starters, including algorithms, AI, networking, database systems, UX, information security and software ...

  8. Information Systems Research

    Information Systems Research (ISR) is a leading peer-reviewed, international journal focusing on theory, research, and intellectual development for information systems in organizations, institutions, the economy, and society. It is dedicated to furthering knowledge in the application of information technologies to human organizations and their management and, more broadly, to improving ...

  9. CS 261: Research Topics in Operating Systems (2021)

    Unresolved: Principled, policy-free control of CPU time. Unresolved: Handling of multicore processors in the age of verification. Replaced: Process kernel by event kernel in seL4, OKL4 and NOVA. Abandoned: Virtual TCB addressing. …. Abandoned: C++ for seL4 and OKL4.

  10. Computer science

    Computer science is the study and development of the protocols required for automated processing and manipulation of data. This includes, for example, creating algorithms for efficiently searching ...

  11. Information technology

    Information technology is the design and implementation of computer networks for data processing and communication. This includes designing the hardware for processing information and connecting ...

  12. Artificial intelligence in information systems research: A systematic

    Artificial intelligence in information systems research: A systematic literature review and research agenda ... implications, and a research agenda for the future. The paper ends with a conclusion and directions for future research. 2. Background and related work. ... AI is the general concept for computer systems able to perform tasks that ...

  13. Articles & Journals

    Useful resources for research in Computer Information Systems. A peer-reviewed (or refereed) journal:. uses experts from the same subject field or profession as the author to evaluate a manuscript prior to acceptance for publication; has articles that report on research studies or provide scholarly analysis of topics; may include book reviews, editorials, or other brief items that are not ...

  14. Computer Science Research Topics

    Computer science research topics can be divided into several categories, such as artificial intelligence, big data and data science, human-computer interaction, security and privacy, and software engineering. If you are a student or researcher looking for computer research paper topics. In that case, this article provides some suggestions on ...

  15. 500+ Computer Science Research Topics

    Computer Science Research Topics are as follows: Using machine learning to detect and prevent cyber attacks. Developing algorithms for optimized resource allocation in cloud computing. Investigating the use of blockchain technology for secure and decentralized data storage. Developing intelligent chatbots for customer service.

  16. Information Technology Dissertation Topics

    List of IT Dissertation Topics Having Potential for Research. A literature analysis on the information quality management framework. A comprehensive investigation of the information system hierarchy. Big data and business intelligence are essential for sustainable development in organisations: Discuss a UK-based perspective.

  17. Computer Science Research Paper Topics: 30+ Ideas for You

    Networking Topics. The networking topics in research focus on the communication between computer devices. Your project can focus on data transmission, data exchange, and data resources. You can focus on media access control, network topology design, packet classification, and so much more. Here are some ideas to get you started with your ...

  18. (PDF) Computer Systems Research: Past and Future

    1. 1. u Computer Systems Research: Past and Future. u Butler Lampson. u People have been inventing new ideas in computer systems for nearly four decades, usually driven by Moore's law. Many of ...

  19. Information Systems Research Topics for MS PhD

    Information Systems Research Topic ideas for MS, or Ph.D. Degree. I am sharing with you some of the research topics regarding Information Systems that you can choose for your research proposal for the thesis work of MS, or Ph.D. Degree. A survey on blockchain for information systems management and security. The perils and promises of big data ...

  20. 78 Management Information System Topics for Presentation and Essays

    Samsung Company's Management Information System. The scope of Management Information System is defined as, "The combination of human and computer based resources that results in the collection, storage, retrieval, communication and use of data for the purpose of efficient management […] Management Information Systems: Making Strategic ...

  21. 412 Computer Topics for Essays & Research Topics about ...

    In the process of using intangible incentives, it is necessary to use, first of all, recognition of the merits of employees. Impact of Computers on Business. This paper seeks to explore the impact of the computer and technology, as well as the variety of its aspects, on the business world. Dependency on Computers.

  22. Management Information Systems Research: A Topic Modeling Based

    Management information systems (MIS) have an interdisciplinary structure. Naturally, it develops and changes with the influence of other fields. This study tries to analyze MIS through academic studies on this topic. In this context, the analysis included 25304 articles published in the Scopus database from 2016 to 2021.

  23. Ten Topics to Get Started in Medical Informatics Research

    CDSS are computer systems designed to assist the medical staff with decision-making tasks about individual ... This article offers newcomers to medical informatics a first introduction and a wealthy overview of current IT-related topics in research and patient care. Nevertheless, there is also a need for further qualification of employees ...

  24. Frontiers

    Persuasive technologies, in connection with human factor engineering requirements for healthy workplaces, have played a significant role in ensuring a change in human behavior. Healthy workplaces suggest different best practices applicable to body posture, proximity to the computer system, movement, lighting conditions, computer system layout, and other significant psychological and cognitive ...

  25. New machine learning algorithm promises advances in computing

    The study was published recently in Nature Communications.. Compact enough to fit on an inexpensive computer chip capable of balancing on your fingertip and able to run without an internet ...

  26. 2024 AP Exam Dates

    AP Seminar and AP Research students to submit performance tasks as final and their presentations to be scored by their AP Seminar or AP Research teachers. AP Computer Science Principles students to submit their Create performance task as final. Late Testing . Occasionally, circumstances make it necessary for students to test late.