CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Trends and Directions in Computer and Information Technology Research: An Evaluative Overview

by Saurabh Deochake, Debajyoti Mukhopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 38
Year of Publication: 2023
Authors: Saurabh Deochake, Debajyoti Mukhopadhyay
10.5120/ijca2023923183

Saurabh Deochake, Debajyoti Mukhopadhyay . Trends and Directions in Computer and Information Technology Research: An Evaluative Overview. International Journal of Computer Applications. 185, 38 ( Nov 2023), 1-8. DOI=10.5120/ijca2023923183

@article{ 10.5120/ijca2023923183,
author = { Saurabh Deochake, Debajyoti Mukhopadhyay },
title = { Trends and Directions in Computer and Information Technology Research: An Evaluative Overview },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2023 },
volume = { 185 },
number = { 38 },
month = { Nov },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number38/32936-2023923183/ },
doi = { 10.5120/ijca2023923183 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:29:01.608757+05:30
%A Saurabh Deochake
%A Debajyoti Mukhopadhyay
%T Trends and Directions in Computer and Information Technology Research: An Evaluative Overview
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 38
%P 1-8
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Choosing a research domain is a critical task for researchers because it has a significant impact on the trajectory of their scholarly journey. A plethora of domains and sub-domains beckon exploration within the vast field of computer and information technology. The challenge lies in carefully selecting the focus of research. This paper addresses the critical issue of identifying promising research domains in the field of computer and information technology. The field’s broad scope, characterized by intertwined disciplines, can appear intimidating. As a result, this study aims to condense this landscape into a curated collection of potential research directions. This paper presents a diverse range of research topics through methodical investigation. The collection is by no means exhaustive, but it aims to highlight areas worthy of consideration. By delineating these potential research trajectories, this paper aims to ignite innovative thinking and spur fresh avenues of research. In essence, this paper serves as a guide for researchers navigating the complexities of topic selection. The authors hope that by shedding light on potential research avenues, this paper can facilitate informed decision-making and contribute to the ongoing advancement of computer and information technology research.

References
  1. Nisha Ahuja, Gaurav Singal, Debajyoti Mukhopadhyay, and Neeraj Kumar. Automated ddos attack detection in software defined networking. Journal of Network and Computer Applications, 187:103108, 05 2021.
  2. Nisha Ahuja, Gaurav Singal, Debajyoti Mukhopadhyay, and Ajay Nehra. Ascertain the efficient machine learning approach to detect different arp attacks. Computers and Electrical Engineering, 99:107757, 2022.
  3. Arohan Ajit, Koustav Acharya, and Abhishek Samanta. A review of convolutional neural networks. In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), pages 1–5, 2020.
  4. Saurabh Deochake. Belief-desire-intention (bdi) multi-agent system for cloud marketplace negotiation. Distributed Computing and Artificial Intelligence, 19th International Conference, page 144–153, Dec 2022.
  5. Saurabh Deochake. Cloud cost optimization: A comprehensive review of strategies and case studies, Jul 2023.
  6. Saurabh Deochake, Vrushali Channapattan, and Gary Steelman. Bigbird: Big data storage and analytics at scale in hybrid cloud. arXiv preprint arXiv:2203.11472, 2022.
  7. Saurabh Deochake and Debajyoti Mukhopadhyay. An agentbased cloud service negotiation in hybrid cloud computing. Advances in Intelligent Systems and Computing, page 563–572, Dec 2020.
  8. Saurabh Deochake, Suresh Sarode, Shashank Kanth, Vidyasagar Potdar, Subhadip Chakraborty, and Debajyoti Mukhopadhyay. Henri: high efficiency negotiation-based robust interface for multi-party multi-issue negotiation over the internet. Proceedings of the CUBE International Information Technology Conference on - CUBE ’12, 2012.
  9. Noa Frankel. Purple ai—empowering cybersecurity analysts with ai-driven threat hunting, analysis & response, Apr 2023.
  10. Robert Frederick. Core concept: Homomorphic encryption. Proceedings of the National Academy of Sciences, 112(28):8515–8516, Jul 2015.
  11. Jiechao Gao, HaoyuWang, and Haiying Shen. Machine learning based workload prediction in cloud computing. 2020 29th International Conference on Computer Communications and Networks (ICCCN), Aug 2020.
  12. Sepp Hochreiter and J¨urgen Schmidhuber. Long Short-Term Memory. Neural Computation, 9(8):1735–1780, 11 1997.
  13. Duy Huynh, Long Zuo, and Hiroyuki Iida. Analyzing gamification of “duolingo” with focus on its course structure. In Rosa Bottino, Johan Jeuring, and Remco C. Veltkamp, editors, Games and Learning Alliance, pages 268–277, Cham, 2016. Springer International Publishing.
  14. Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, and Laurens van der Maaten. Crypten: Secure multi-party computation meets machine learning. Advances in Neural Information Processing Systems, 34:4961–4973, 2021.
  15. Shawn Loewen, Dustin Crowther, Daniel R. Isbell, Kathy Minhye Kim, Jeffrey Maloney, Zachary F. Miller, and Hima Rawal. Mobile-assisted language learning: A duolingo case study. ReCALL, 31(3):293–311, 2019.
  16. Abdul Majeed and Sungchang Lee. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access, 9:8512–8545, 2021.
  17. Mohammad Mousa, Ayman M. Bahaa-Eldin, and Mohamed Sobh. Software defined networking concepts and challenges. In 2016 11th International Conference on Computer Engineering and Systems (ICCES), pages 79–90, 2016.
  18. Samya Muhuri and Debajyoti Mukhopadhyay. Extracting the relationships among students based on accessing pattern of digital learning attributes. IEEE Transactions on Learning Technologies, 15(6):747–756, 2022.
  19. Debajyoti Mukhopadhyay, Archana Chougule, and Sheetal Vij. Decision Support System and Automated Negotiations. CRC Press, Jul 2023.
  20. Debajyoti Mukhopadhyay, Saurabh Deochake, Shashank Kanth, Subhadip Chakraborty, and Suresh Sarode. Mainwave: multi agents and issues negotiation for web using alliance virtual engine. arXiv preprint arXiv:1206.5884, 2012.
  21. Hussan Munir, Bahtijar Vogel, and Andreas Jacobsson. Artificial intelligence and machine learning approaches in digital education: A systematic revision. Information, 13(4), 2022.
  22. Vahab Samandi and Debajyoti Mukhopadhyay. Workflow scheduling in cloud computing environment with classification ordinal optimisation using svm. International Journal of Computational Science and Engineering, 24(6):563–563, Jan 2021.
  23. Georgios L. Stavrinides and Helen D. Karatza. Energy-aware scheduling of real-time workflow applications in clouds utilizing dvfs and approximate computations. In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), pages 33–40, 2018.
  24. V. Sumithra, R. Shashidhara, and Debajyoti Mukhopadhyay. Design of a secure and privacy preserving authentication protocol for telecare medical information systems. SECURITY AND PRIVACY, 5(4):e228, 2022.
  25. Nigar M Shafiq Surameery and Mohammed Y Shakor. Use chat gpt to solve programming bugs. International Journal of Information Technology & Computer Engineering (IJITC) ISSN: 2455-5290, 3(01):17–22, 2023.
  26. S.R Vij, D. Mukhopadhyay, and A.J. Agrawal. Automated negotiation in e commerce: Protocol relevance and improvement techniques. Computers, Materials & Continua, 61(3):1009–1024, 2019.
  27. Jiaheng Zhang, Zhiyong Fang, Yupeng Zhang, and Dawn Song. Zero knowledge proofs for decision tree predictions and accuracy. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Oct 2020.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing digital learning privacy preserving protocols decision support systems automated negotiation software-defined networking cybersecurity generative ai chatgpt