What Other Areas In Computer Science And Science In General Does The Area Relate To?
Identify a Significant Research Question In This Area. What Methods Could Be Used To Investigate This Question. Evaluate The Effectiveness Of These Methods.
What Relevance Does This Kind Of Work Have In General? How Might It Be Generally Helpful? Are There Any Possible Negative Implications?
Many organizations have used robotics for managing their work, which has improved the productivity and performance of the organization. Thus, it is a basic need for automation to create interaction between robots and human, which will be provided with better outcomes. In addition, there are many things to improve in the field of automation and robotics including human interaction. There are many approaches to artificial intelligence (AI), which can be used for managing various things. AI can be used to improve human-robot interaction, which is better for improvement (Argall & Billard, 2010). Human is sensitive to some works. Thus, robots can be used to manage many works, which are dangerous for humans, such as critical works in mining industries.
Relation to Computer Science in general: it is related to machine learning and AI, which is highly used for managing various things. It can relate to emerging technologies, which are the basic needs of the system. Robotics is a part of Computer science, as it has created based on algorithms and different techniques (Mavridis, 2015).
Robotics is a huge field for research work, but it should be in ethical considerations. There are some issues related to system design and manufacturing, which make a huge impact on design as well. Research organizations should work in a limit, which is harmless devices and equipment. In addition, there are some basic ideas behind the research work in the field of human-robot interaction. Robotics can be impacted the human as well, thus, it should be managed properly (Sheridan, 2016). There are many surveys to understand the research work at work. Moreover, human-robot interaction is a must as per the demand of the market (Mumm & Mutlu, 211). In the present generation, robotics is a new trend in various industries. Therefore, it is necessary to improve the basic needs of a function. Moreover, automation processes have used for managing various things (Majidi, 2014). Moreover, research can be modified for robotics and human interaction based on the need of human beings and the industry (Watanabe, 2011). It will be more beneficial for human beings and industries. However, it can be changed based on feedback about the various approaches in the field of human-robotic interaction. In addition, human-robot interaction will be used in various areas, such as education, healthcare, security, retails, tourism, and many more. Robots are the creation of AI and machine learning, which can be managed using various processes.
Human-robot interaction is beneficial for the future generation, as it will reduce the efforts of humans for many works, which are suitable for humans. In addition, robotics has used to manage all the things in a better way. Moreover, emerging technologies have used robotics for various purposes, such as development, designing, manufacturing, and many more.
Generally, robotics is a common need of most of the areas. Thus, it should be better to manage various processes. There are some negative impacts of human-robot interaction, which is not good for the future generations, such as bugs, hacking, cybercrime, and many more. Human-robot interaction is helpful in the development of new systems, which are beneficial for companies and customers. There are various fields, where robots have used, which are dangerous processes. Thus, it can be better to modify the automation process using human-robot interaction. Research must include negative impacts of human-robot interaction, which can be dangerous for human beings. There are many factors in the research, which must base on the rule and regulations and ethics. Research must follow the public interest, as it can be used for the benefits of humans as well.
Research area: Cloud Computing (CC) is the best field for research work, as it has resolved various issues for many areas, such as data storage, virtualization, and many more. In addition, CC has faced issues and challenges in privacy and security (Chen & Zhao, 2012). There are many issues with the development and implementation of CC in a firm. Moreover, CC can be used for various areas, such as healthcare, education, retails, and many more. Thus, it is necessary to develop a high level of security and privacy, especially for the banking sector. In addition, the cloud can be used for private and public services for managing various things (Jansen, 2011). This work can improve the security of CC, which is necessary for most of the clients. In addition, there are various methods to improve the level of security and privacy in the CC. it will be helpful in the various fields, such as healthcare, education, tourism, engineering, and many others.
Relation to Computer Science in general: CC is a part of computer science, as it is a platform for providing various services to clients, such as data storage, network management, virtualization, and many others. It can be used for managing different architectures (Prokopp, 2014).
Research questions and methods: Additionally, research can be based on the security of data in the cloud, which can be based on network security, data security, and many others. Thus, it is can be including various things to develop a new architecture for managing various things (Kshetri, 2013). Moreover, there is some risk associated with cloud architecture, which can be a base of research to improve architecture as well (Mather, et al., 2009). Security of data first needs of a system, as confidential information is necessary for the customers in the market (Pearson, 2013). In addition, the modern organization has used ERP systems for managing various issues in their business. Thus, it is necessary to improve the basic needs of the area, which can be beneficial for the user as well (Peng & Gala, 2014). Besides, CC has used a complex system for managing basic processes, such as development, implementation and more (Publishing, 2018). However, there are many security architectures, which can be used for managing various services (Rittinghouse & Ransome, 2016). There is logic behind the CC, which makes it better for technological solutions. There are some basic needs to advance research to optimized services.
General relevance: CC is a part of most of the large-scale firms, which has adopted various methods, which are beneficial for them. Research can be used to resolve current issues of those areas, which has suffered from security and privacy issues. There is some negative impact of CC, as it has connected with the public network as well, which can be hacked. Thus, it is necessary to make changes to secure the whole architecture (Romansky, 2012).
Cloud computing is a good technology in front of various industries to develop their business, as it can be used for managing various things. Moreover, people can use advance services to their businesses and other works. Research can be based on the areas. Cloud computing can be used for managing research work as well. There are some internal techniques, which can improve the security of the CC. thus, it is necessary to improve the security of the CC to manage other works in an efficient manner. Backup and recovery are necessary for a firm to secure their data using CC. therefore, it is necessary to improve the basic things in CC, which will provide positive feedbacks from various industries (Jansen, 2011).
Research area: data mining is a good approach for data analytics and other things, which are beneficial for various things. Most of the mining techniques have used in the field of social data mining. Social media networking sites have a large amount of data, which is useful for prediction and decision for a task (White, et al., 2017). Moreover, text mining is helpful in the social network's mining. In addition, there are many features of social media networking sites, which is good for users and firms as well. There are many good topics to manage research work. There are some basic needs to analyse data sets and items of the database (Bifet, 2013). Moreover, research can be based on the business model of social media networking sites.
Relation to Computer Science in general: Mining is an advance part of the database system, which is a part of computer science. Data mining is based on Big Data (BD), which is a useful technique for data management. The data warehouse is related to the computer science field (Taylor, 2018). Social data mining is helping in the business models as well.
Research questions and methods: Role of data mining and big data in social data mining is a different type of research, which will provide better solutions to various problems. Can data mining will help in social mining, as it is an area to research (Smolan, 2013). Moreover, research can be used to analyse surveys and feedbacks of experts to design various techniques, which is good for the company. Big data is a base of data management, which has used for managing a large amount of data (Al-Jarrah, et al., 2015). Social mining is a new trend in social media, which is useful for business as well. Social mining can be used for identifying the behaviour of users, which is a good thing for business (Bou-Harb, et al., 2016). Social media is a way for collaborating employees and firm. Besides, it is a new trend to manage conflicts between people as well (Manovich, 2011). Social mining can be helpful in the betterment of the business model and behavioural modelling. In addition, there are many advantages of social mining, which is better for managing basic things on social media sites. It can be managed using basic things.
General relevance: there are many good impacts of such types of research. In addition, there are many benefits to social mining. Most of the things have used for arranging a large amount of data analytics and mining. In addition, data security has required to manage confidential data of a firm. There is some negative impact of social media on the behavior learning of users. It is connecting with the present and future generations. However, the mining process has required structured data for mining. Thus, it can be useful for various field as well. Social media is common in the present generation, as most of the people have used smartphones for various purposes. Therefore, it is highly required to apply text mining and other mining approaches for better results in the business.
Research area: there are many benefits of big data analytics, which can be used for managing various things in a firm. It is a common issue in a firm to manage a data in a proper structure for reporting and analysis process. Most of the firms have used their personal databases. However, a large-scale organization can afford only data centres, as they are costly. There is a scope of research to provide better data analytics using big data and data mining technology with minimum cost and time (Verma, 2018).
Relation to Computer Science in general: Big data is a part of computer science, as well as data analytics, is a part of this area. Thus, it is necessary to develop an advanced system to use different technologies for solving a common issue of various firms for their business (Gupta, et al., 2018).
Research questions and methods: Mostly research has used to innovate new things. However, it can be used for solving an issue using different techniques, such as big data and data analytics. In addition, Business Intelligence (BI) is a new trend in the industry to manage all the changes (Chen, et al., 2012). Big data plays a huge role in data analytics, which has faced critical issues to manage a large amount of data (Chowdhury, 2014). BD can be a useful tool for managing various things in a firm, such as marketing, sales and many others (Gupta, et al., 2018). There is a huge benefit of connecting various technologies for managing various things, such as big data, cloud computing, and many more. (Verma, 2018). Big data analytics will provide better results for decision making, which is necessary for business processes. Additionally, big data analytics can be used for managing the services of a firm, which can be optimized using different techniques. A protocol model can be used for solving such types of issues. Thus, it will be better for current and future generations (Taylor, 2018). There are some specific parts of a system, which can be modified using various things, such as CC and big data. There are some basic things to improve the efficiency of the system as well. Many things can be analysed using basic service as well. Most of the things can be optimized using research methods. Thus, it is necessary to improve the research work based on the various agile techniques. It will provide better results in the field of computer science. Big data is improving based on research and analysis based on the issues and challenges in the industries (Smolan, 2013).
General relevance: role of big data analytics is huge according to the success rate of various firms. Thus, it is necessary to research such types of techniques, which has reduced cost and time from various business functions. In addition, there is some negative impact of big data analytics, as small businesses have not required such types of facilities. Positive impacts can affect various areas as well. There is some limit to the research work because of resources.
In addition, improvement is necessary for the field of big data analytics, which will help in various areas, such as healthcare, retail, education, security, and many more. Big data analytics can be modified using advance research on machine learning and deep learning, which will provide better functions to manage various things. Most of the programs have used for the management of various things in a firm. It can be related with the various industries, such as retail, education, healthcare, and many more. This is a good topic for research, as most of the medium and large-scale organizations have used bid data analytics.
References
Al-Jarrah, O. Y. et al., 2015. Efficient machine learning for big data: A review. Big Data Research, 2(3), pp. 87-93.
Argall, B. D. & Billard, A. G., 2010. A survey of tactile human–robot interactions. Robotics and autonomous systems, 58(10), pp. 1159-1176.
Bifet, A., 2013. Mining big data in real time. Informatica, 37(1).
Bou-Harb, E., Debbabi, M. & Assi, C., 2016. Big data behavioral analytics meet graph theory: on effective botnet takedowns. IEEE Network, 31(1), pp. 18-26.
Chen, D. & Zhao, H., 2012. Data security and privacy protection issues in cloud computing. International Conference on Computer Science and Electronics Engineering, 1(1), pp. 647-651.
Chen, H., Chiang, R. H. & Storey, V. C., 2012. Business intelligence and analytics: from big data to big impact. MIS quarterly, pp. 1165-1188.
Chowdhury, S., 2014. Big data and data warehouse augmentation. [Online]
Available at: https://www.ibm.com/developerworks/library/ba-augment-data-warehouse1/index.html
Gupta, . A. et al., 2018. Big data & analytics for societal impact: Recent research and trends. 20(2), 185-194.. Information Systems Frontiers, 20(2), pp. 185-194.
Jansen, W. A., 2011. Cloud hooks: Security and privacy issues in cloud computing.. Hawaii, IEEE, pp. 1-10.
Kshetri, . N., 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), pp. 372-386.
Majidi, C., 2014. Soft robotics: a perspective—current trends and prospects for the future. Soft Robotics, 1(1), pp. 5-11.
Manovich, L., 2011. Trending: The promises and the challenges of big social data. Debates in the digital humanities, Volume 2, pp. 460-475.
Mather, T., Kumaraswamy, S. & Latif, S., 2009. Cloud security and privacy: an enterprise perspective on risks and compliance.. Sebastopol: O'Reilly Media, Inc..
Mavridis, N., 2015. A review of verbal and non-verbal human–robot interactive communication. Robotics and Autonomous Systems, 63(1), pp. 22-35.
Mumm, . J. & Mutlu, B., 211. Human-robot proxemics: physical and psychological distancing in human-robot interaction.. s.l., ACM, pp. 331-338.
Pearson, . S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing. 1 ed. London: Springer.
Peng, G. C. A. & Gala, C., 2014. Cloud ERP: a new dilemma to modern organisations?. Journal of Computer Information Systems, 54(4), pp. 22-30.
Prokopp, C., 2014. Big Data Science and Cloud Computing. [Online]
Available at: https://www.semantikoz.com/blog/big-data-as-a-service-definition-classification/
[Accessed 25 October 2019].
Publishing, P., 2018. Complex Cloud Architecture Types. [Online]
Available at: https://www.networkcomputing.com/cloud-infrastructure/complex-cloud-architecture-types
Rittinghouse, J. W. & Ransome, J. F., 2016. Cloud computing: implementation, management, and security. Florida: CRC press.
Romansky, R., 2012. Cloud Services: Challenges for Personal Data Protection. International Journal on Information Technologies and Security, pp. 67-80.
Sheridan, T. B., 2016. Human–robot interaction: status and challenges. Human factors, 58(4), pp. 525-532.
Smolan, R., 2013. The human face of big data. s.l.:s.n.
Taylor, P. L., 2018. Big Data Mining Previews 2019's Hottest Vacation Trends And The Future Of Online Travel. [Online]
Available at: https://www.forbes.com/sites/petertaylor/2018/12/02/big-data-mining-previews-2019s-hottest-vacation-trends-and-the-future-of-online-travel/#285a5f6d4d26
[Accessed 11 December 2018].
Verma, A., 2018. The Relationship between IoT, Big Data, and Cloud Computing. [Online]
Available at: https://www.whizlabs.com/blog/relationship-between-iot-big-data-cloud-computing/
Watanabe, T., 2011. Human-entrained embodied interaction and communication technology. 1st ed. London: Springer.
White, G., Ariyachandra, T. & White, D., 2017. Big Data, Ethics, and Social Impact Theory-A Conceptual Framework. Journal of Management & Engineering Integration, 10(1), pp. 22-28.