Science topics: Computer Science
Science topic

# Computer Science - Science topic

Explore the latest publications in Computer Science, and find Computer Science experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Computer Science (10,000)
Sorted by most recent
Research
Full-text available
This Special Issue, "Advances in Linear Recurrence System", welcomes submissions from a broad interdisciplinary area. Typical interdisciplinary uses of recurrence relations are to describe the kinetics of physical, chemical, and biological processes. In biology, some of the best-known difference equations originated from the attempt to model popula...
Article
Full-text available
With the innovative development of advanced technology in the field of medical, there is an enlargement in the generation of other problems such as management of biomedical waste. Hazardous waste generated from hospitals is required to be managed within time and it can be done effectively using some computer science technology. In the proposed meth...
Article
Full-text available
One of the most influential working hypotheses in psychology, to this day, is that human information processing in higher-order cognition (e.g., judgment and decision-making) is constrained by having to process objects serially, one at a time. However, a rather large body of research, accumulated over the past 50 years, has demonstrated that serial...
Article
Full-text available
We study two-qubit circuits over the Clifford+CS gate set, which consists of the Clifford gates together with the controlled-phase gate CS = diag(1, 1, 1, i ). The Clifford+CS gate set is universal for quantum computation and its elements can be implemented fault-tolerantly in most error-correcting schemes through magic state distillation. Since no...
Article
Full-text available
Quantum machine learning models have the potential to offer speedups and better predictive accuracy compared to their classical counterparts. However, these quantum algorithms, like their classical counterparts, have been shown to also be vulnerable to input perturbations, in particular for classification problems. These can arise either from noisy...
Poster
Full-text available
The Larbi Ben M’hidi University of Oum El Bouaghi through the Electronics and New Technologies ‎Laboratory (LENT) is organizing the first international conference on electronics, artificial intelligence and ‎new technologies. This conference will cover all the research activities of the laboratory; moreover, the ‎conference will include different a...
Poster
Full-text available
TOPICS The activity includes all interdisciplinary fields of engineering and natural sciences including mechanics, computer science and electrics. You can have an idea on the topical fields at http://icmece.org/scope-and-interests
Article
Full-text available
This paper focuses on the problem of fairly and efficiently allocating resources to agents. We consider a specific setting, usually referred to as a housing market, where each agent must receive exactly one resource (and initially owns one). In this framework, in the domain of linear preferences, the Top Trading Cycle (TTC) algorithm is the only pr...
Conference Paper
Full-text available
Self-assessment serves to improve learning through timely feedback on one's solution and iterative refinement as a way to incrementally improve one's competence. The SelfAssess-plugin developed in Moodle provides unlimited opportunities for students to create and assess solutions to self-assessment questions. A field study examined how 131 students...
Article
Full-text available
In the first 6 months of 2020, the COVID-19 pandemic forced numerous universities across the globe to quickly transfer all their courses online, a response known as Emergency Remote Teaching. Courses initially designed for face to face delivery had to be quickly adapted to a new online format. In this paper, we study the perception of the transitio...
Article
Full-text available
Source code plagiarism is a common occurrence in undergraduate computer science education. In order to identify such cases, many source code plagiarism detection tools have been proposed. A source code plagiarism detection tool evaluates pairs of assignment submissions to detect indications of plagiarism. However, a plagiarising student will common...
Article
Full-text available
This protocol provides a step-by-step approach to perturb single cells with time-varying stimulation profiles, collect distinct signaling responses, and use these to infer a system of ordinary differential equations to capture and predict dynamics of protein-protein regulation in signal transduction pathways. The models are validated by predicting...
Article
Full-text available
Processing the 3D objects is a research field of computer graphics that can be applied in 3D simulation, 3D image processing, game industry, etc. This is one of the mathematics-based research fields where geometrical knowledge is the background of existing methods. Geometric modeling is a branch of this research field based on the applied mathemati...
Article
Full-text available
Underrepresentation of women in computer science (CS) increasingly demands the necessity to find and enhance current learning engagement approaches to bring more women into computing fields. Some researchers have been exploring the influence of gamification on female students as one of these possible learning engagement strategies. Gamification ref...
Article
Full-text available
Gamification—the use of game elements in serious contexts, has been prevalent to enhance users’ motivation and engagement in difficult activities. In the literature related to higher education, the use of gamification has emerged as a new pedagogical approach in order to improve students’ learning behaviors. On the other hand, traditional education...
Article
Full-text available
Author name disambiguation (AND), also recognized as name-identification, has long been seen as a challenging issue in bibliographic data. In other words, the same author may appear under separate names, synonyms, or distinct authors may have similar to those referred to as homonyms. Some previous research has proposed AND problem. To the best of o...
Preprint
Full-text available
Far from being a bizarre pastime, alchemy played a crucially important role in the history of science, being supported and promoted by leading political and scientific figures (such as Rudolf II, Jābir ibn Hayyān, Gerard of Cremona, Adelard of Bath, Roger Bacon, Paracelsus, and even New-ton). To understand alchemy, however, one has to approach it f...
Article
Full-text available
Permutation patterns and pattern avoidance have been intensively studied in combinatorics and computer science, going back at least to the seminal work of Knuth on stack-sorting (1968). Perhaps the most natural algorithmic question in this area is deciding whether a given permutation of length n contains a given pattern of length k . In this work w...
Article
Full-text available
Cooperative and competitive building blocks drive the evolution of GP. There exists useful schema which remains promising and persistent in terms of their occurrence over the generations. These schemas are majorly present at levels other than root level, and gradually this genetic material is pushed towards the root level by cooperation, where they...
Conference Paper
Full-text available
While Human-Computer Interaction (HCI) has successfully contributed to innovation, HCI education has made only moderate efforts to include innovation as part of the curriculum. In this paper, therefore, we propose a service-dominant logic-informed framework for teaching innovation in the context of HCI education. Our approach combines service-domin...
Article
Full-text available
Data analytics provides important tools and methods for processing the data generated during legal services. This paper aims to provide a systematic survey of the research papers on the application of quantitative data analytics algorithms in the legal domain. To this end, relevant research papers were collected and used to analyze topics and trend...
Article
Full-text available
The first aim of this study was to develop a prothrombin time international normalized ratio (PT INR) prediction model. The second aim was to develop a warfarin maintenance dose decision support system as a precise warfarin dosing platform. Data of 19,719 inpatients from three institutions was analyzed. The PT INR prediction algorithm included dens...
Article
Full-text available
Combining satellite imagery with machine learning (SIML) has the potential to address global challenges by remotely estimating socioeconomic and environmental conditions in data-poor regions, yet the resource requirements of SIML limit its accessibility and use. We show that a single encoding of satellite imagery can generalize across diverse predi...
Article
Full-text available
Deep convolutional neural networks, assisted by architectural design strategies, make extensive use of data augmentation techniques and layers with a high number of feature maps to embed object transformations. That is highly inefficient and for large datasets implies a massive redundancy of features detectors. Even though capsules networks are sti...
Preprint
Full-text available
Structure or projectional editors are a well-studied concept among researchers and some practitioners. They have the huge advantage of preventing syntax and in some cases type errors, and aid the discovery of syntax by users unfamiliar with a language. This begs the question: why are they not widely used in education? To answer this question we per...
Article
Full-text available
Computer vision is an area of research concerned with assisting computers in seeing. Computer vision issues aim to infer something about the world from observed picture data at the most abstract level. It is a multidisciplinary subject that may be loosely classified as a branch of artificial intelligence and machine learning, both of which may incl...
Article
Full-text available
Technology is playing an increasingly prominent role in all human endeavors, including education. Tech enables the realization of educational environments that are adaptive, interactive, and immersive. Such environments are well-suited for appropriately engaging student populations comprised of digital natives. Bricklayer is an educational ecosyste...
Preprint
Full-text available
The paper provides a tableau approach to definite descriptions. We focus on several formalizations of the so-called minimal free description theory (MFD) usually formulated axiomatically in the setting of free logic. We consider five analytic tableau systems corresponding to different kinds of free logic, including the logic of definedness applied...
Article
Full-text available
Scattering in biological tissues is a major barrier for in vivo optical imaging of all but the most superficial structures. Progress toward overcoming the distortions caused by scattering in turbid media has been made by shaping the excitation wavefront to redirect power into a single point in the imaging plane. However, fast, non-invasive determin...
Article
Full-text available
The ar cle presents the experience of using visualiza on technology in the professional training of future engineers-teachers of computer profile, in par cular video lectures on the example of training IT specialists. It is emphasized that it is necessary to change the paradigm of teaching computer disciplines in the context of visualiza on of dida...
Article
Full-text available
Background: Obsessive-compulsive disorder (OCD) has long been considered as an anxiety disorder, disgust is the dominant emotion in contamination-based OCD. However, disgust seems resistant to exposure with response prevention partly due to the fact that disgust is acquired through evaluative conditioning. Aims: The present research investigates...
Article
Full-text available
In recent years, disinformation and “fake news” have been spreading throughout the internet at rates never seen before. This has created the need for fact-checking organizations, groups that seek out claims and comment on their veracity, to spawn worldwide to stem the tide of misinformation. However, even with the many human-powered fact-checking o...
Conference Paper
Full-text available
In this paper, we applied the tensor completion method based on the denoising optimization with Inequality Constrained Convex for recovering images. Convex optimization, rather than a non-convex approach, still play important roles in many computer science applications because of its exactness and efficiency. we consider a tensor completion problem...
Article
Full-text available
A vertex distinguishes (or resolves) two elements (edges or vertices) if . A set of vertices in a nontrivial connected graph is said to be a mixed resolving set for if every two different elements (edges and vertices) of are distinguished by at least one vertex of . The mixed resolving set with minimum cardinality in is called the mixed metric dime...
Article
Full-text available
Diabetic retinopathy (DR) is one of the leading causes of vision loss across the world. Yet despite its wide prevalence, the majority of affected people lack access to the specialized ophthalmologists and equipment required for monitoring their condition. This can lead to delays in the start of treatment, thereby lowering their chances for a succes...
Article
Full-text available
The global spread of COVID-19, the disease caused by the novel coronavirus SARS-CoV-2, has casted a significant threat to mankind. As the COVID-19 situation continues to evolve, predicting localized disease severity is crucial for advanced resource allocation. This paper proposes a method named COURAGE (COUnty aggRegation mixup AuGmEntation) to gen...
Article
Full-text available
The knowledge gained from data mining is highly dependent on the experience of an expert for further analysis to increase effectiveness and wise decision-making. This mined knowledge requires actionability enhancement before it can be applied to real-world problems. The literature highlights the reasons that emerged the need to incorporate human wi...
Article
Full-text available
As important information provided by recommender systems, knowledge graphs are widely applied in computer science and many other fields. The recommender system performance can be significantly improved by leveraging the knowledge graph between the user and item. Various recommendation approaches have been proposed based on the knowledge graph in re...
Conference Paper
Full-text available
Camping preparation and transporting furniture, the similarities between those two are having to move things inside a limited space. These processes have somewhat of a similarity to the concept of memory allocation. Our target through this project is we want to explain the basics of memory allocation with an easily understandable media. The media t...
Conference Paper
Full-text available
Recently, there has been a noticeable growth in the number of research publications in areas of computer science. However, no bibliometric study on coronavirus illness (COVID-19) has been conducted in computer science to date. The purpose of this study is to show the bibliometric data associated with COVID-19 research articles in the field of compu...
Preprint
Full-text available
Objective: The purpose of this paper is to identify the largest cognitive challenges faced by novices developing software in teams. Method: Using grounded theory, we conducted an ethnographic study for two months following four ten person novice teams, consisting of computer science students, developing software systems. Result: This paper identifi...
Article
Full-text available
Cultural processes can reduce self-selection into math and science fields, but it remains unclear how confidence in computer science develops, where women are currently the least represented in STEM (science, technology, engineering, and mathematics). Few studies evaluate both computer skills and self-assessments of skill. In this paper, we evaluat...
Article
Full-text available
Nowadays, Data Science (DS) is gaining a relevant impact on the community. The most recent developments in Computer Science, such as advances in Machine and Deep Learning, Big Data, Knowledge Discovery, and Data Analytics, have triggered the development of several innovative solutions (e.g., approaches, methods, models, or paradigms). It is a trend...
Article
Full-text available
Machine learning models are poised to make a transformative impact on chemical sciences by dramatically accelerating computational algorithms and amplifying insights available from computational chemistry methods. However, achieving this requires a confluence and coaction of expertise in computer science and physical sciences. This Review is writte...
Article
Full-text available
Les programmes de mathématiques incluent algorithmique et informatique désormais dès le primaire. Comprendre l'évolution des pratiques enseignantes est alors un enjeu pour la recherche et la formation. L'article analyse les pratiques de cinq enseignants qui intègrent pour la première fois Scratch ou des robots. Nos cadres en didactique des mathémat...
Article
Full-text available
Algebraic structures play a prominent role in mathematics with wide ranging applications in many disciplines such as theoretical physics, computer sciences, control engineering, information sciences, coding theory, and topological spaces. This provides sufficient motivation to researchers to review various concepts and results from the realm of abs...
Chapter
Full-text available
A Big Data fordulat, a részvételi-fordulat és az információgazdaság az elmúlt húsz évben gyökeresen átalakította társadalmunkat, emberi kapcsolatinkat, és magát a tudományos megismerést is. Tanulmányomban a tudományban jelenleg zajló episztemológiai és módszertani fordulatot és ezeknek a társadalomtudomány szerepvállalására és oktatására gyakorolt...
Article
Full-text available
Quantum image representation (QIR) is a necessary part of quantum image processing (QIP) and plays an important role in quantum information processing. To address the problems that NCQI cannot handle images with inconsistent horizontal and vertical position sizes and multi-channel image processing, an improved color digital image quantum representa...
Preprint
Full-text available
Theoretical computer science (TCS) is a subdiscipline of computer science that studies the mathematical foundations of computational and algorithmic processes and interactions. Work in this field is often recognized by its emphasis on mathematical technique and rigor. At the heart of the field are questions surrounding the nature of computation: Wh...
Article
Full-text available
Artificial Intelligence and Machine Learning are the fields of computer science. These are the most explored technologies which are used in various fields to reduce human efforts eg. Healthcare, Education, Retail, etc. Machine Learning is a subfield of Artificial Intelligence. ML and AI are proved for better disease detection, identification, diagn...
Preprint
Full-text available
The constraint satisfaction problem (CSP) is a computational problem that includes a range of important problems in computer science. We point out that fundamental concepts of the CSP, such as the solution set of an instance and polymorphisms, can be formulated abstractly inside the 2-category $\mathcal{P}\mathbf{FinSet}$ of finite sets and sets of...
Article
Full-text available
In many applications, one works with neural network models trained by someone else. For such pretrained models, one may not have access to training data or test data. Moreover, one may not know details about the model, e.g., the specifics of the training data, the loss function, the hyperparameter values, etc. Given one or many pretrained models, i...
Article
Full-text available
Abnormal climate event is that some meteorological conditions are extreme in a certain time interval. The existing methods for detecting abnormal climate events utilize supervised learning models to learn the abnormal patterns, but they cannot detect the untrained patterns. To overcome this problem, we construct a dynamic graph by discovering the c...
Conference Paper
Full-text available
One of the contributing factors to the continuing debate among art historians over the use of computational methods in art history research is that they do not consider the core of today's art history research questions. The lack of close collaboration between the two involved research communities makes the definition of contemporary art-historical...
Chapter
Full-text available
Z Görüntü işleme, günümüzde birçok endüstride kullanılan ve bilgisayarında kullanılması ile gittikçe yaygınlaşmış olan alandır. Sağlık alanında bilgisayarların yaygın kullanılması sağlık enformatiği adı altında bilim dalının ortaya çıkmasına sebep olmuştur. 19. Yüzyılın sonunda Wilhem Conrad Röntgeninin bir rastlantı ile X-ışınlarını keşfetmesi son...
Article
Full-text available
Smart card data from the Automatic Fare Collecting systems (AFC) and timetable information, such as Automatic Vehicle Location (AVL), are used in combination by practitioners and researchers to gain a deeper understanding of the public transit network. In some cases, AVL data are not available due to records being missing in the system. In such cas...
Article
Full-text available
Medical informatics, as much as it is a result of evolution as planned philosophy, have its roots in the history of information technology and medicine. Development of medical informatics started in the fifties of the 20th century. In the period after Second World War USA was the leading country in the field of Computer science and the leader in us...
Article
Full-text available
The database community has observed in the past two decades, the growth of research interest in preference queries, each of which has its unique techniques, benefits, and drawbacks. One of them is skyline queries. Skyline queries aim to report to users interesting objects based on their preferences. Yet, they are not without their limitations. Henc...
Conference Paper
Full-text available
The Digital culture has provided a favorable environment to migration from transmissive education to active learning. The possibility of the integrated use of different media, the possibilities of communication and the cooperative creation of artefacts, both in digital media and tangibles medias, allows the conception of a school that overflows the...
Preprint
Full-text available
Gender diversity in the tech sector is - not yet? - sufficient to create a balanced ratio of men and women. For many women, access to computer science is hampered by socialization-related, social, cultural and structural obstacles. The so-called implicit gender bias has a great influence in this respect. The lack of contact in areas of computer sci...
Chapter
Full-text available
Adversarial Machine Learning has emerged as a substantial subfield of Computer Science due to a lack of robustness in the models we train along with crowdsourcing practices that enable attackers to tamper with data. In the last two years, interest has surged in adversarial attacks on graphs yet the Graph Classification setting remains nearly untouc...
Article
Full-text available
Digital holography is a very efficient technique for 3D imaging and the characterization of changes at the surfaces of objects. However, during the process of holographic interferometry, the reconstructed phase images suffer from speckle noise. In this paper, de-noising is addressed with phase images corrupted with speckle noise. To do so, DnCNN re...
Article
Full-text available
The present study investigated disciplinary similarities and differences in the rhetorical structure of 120 preface sections drawn from three soft disciplines, namely applied linguistics, business administration, and law, as well as from hard disciplines, namely computer sciences, chemistry, and biology. While the overall results showed a five-move...
Article
Full-text available
Microservices and Big Data are renowned hot topics in computer science that have gained a lot of hype. While the use of microservices is an approach that is used in modern software development to increase flexibility, Big Data allows organizations to turn today’s information deluge into valuable insights. Many of those Big Data architectures have r...
Article
Full-text available
With the development of sequencing technologies, more and more amounts of sequence data are available. This poses additional challenges , such as processing them is usually a complex and time-consuming computational task. During the construction of phylogenetic trees, the relationship between the sequences is examined, and an attempt is made to rep...
Article
Full-text available
With the increased reliance on technology, computer programming has emerged as an essential skill that is interesting to many audiences beyond merely computer scientists. As a result, many students from various disciplines take first-year computer science courses. This led to classrooms with a lot of diversity in student motivation, backgrounds, le...
Presentation
Full-text available
- The dilemmas, similarities and differences with close scientific disciplines: mathematics, statistics, computer science and artificial intelligence - Official Statistics 4.0 - The profile of data scientists, as well as their roles in national statistical systems - The modalities of education of these experts - A number of recommendations for fu...
Article
Full-text available
In mathematics and computer sciences, the partitioning of a set into two or more disjoint subsets of equal sums is a well-known NP-complete problem, also referred to as partition problem. There are various approaches to overcome this problem for some particular choice of integers. Here, we use quadratic residue graph to determine the possible parti...
Article
Full-text available
We focus on the automatic detection of communities in large networks, a challenging problem in many disciplines (such as sociology, biology, and computer science). Humans tend to associate to form families, villages, and nations. Similarly, the elements of real-world networks naturally tend to form highly connected groups. A popular model to repres...
Article
Full-text available
Scaffolding is the final step in assembling Next Generation Sequencing data, in which pre-assembled contiguous regions (”contigs”) are oriented and ordered using information that links them (for example, mapping of paired-end reads). As the genome of some species is highly repetitive, we allow placing some contigs multiple times, thereby generalizi...
Article
Full-text available
We propose a new design for a repetitive control scheme for nonlinear minimum-phase systems with arbitrary relative degree and globally Lipschitz nonlinearities. We represent the delay of the repetitive control scheme as a transport equation and we propose a new forwarding-based (partial) state-feedback design that uses not only the boundary inform...
Conference Paper
Full-text available
We, students of the Computer Science course in Sunway University conducted a research regarding the positive impacts of Internet-of-Things(IoT) in our daily lives. The porfolio concludes our findings in the form of a research paper as well as related drafts and materials.
Article
Full-text available
According to the stereotype content model, stereotypes can be described by using the dimensions competence and warmth. Compared to other professions, teaching is associated with a paternalistic stereotype consisting of high warmth and low competence. In four studies, stereotypes about different subgroups of pre-service teachers were compared. The a...
Article
Full-text available
The subject of this research is the quality of items on the entrance exam for students with special abilities for informatics and computer science. The aim of the research is to determine the quality of the items and the whole test, based on metric characteristics (reliability, informativity, discrimination, and difficulty of items). There was a to...