Science topics: Computer Science
Science topic

Computer Science - Science topic

Explore the latest publications in Computer Science, and find Computer Science experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Computer Science (10,000)
Sorted by most recent
Poster
Full-text available
Dear Colleagues, Fluid flows and their interactions with structures are of great importance in both fundamental research and engineering applications. Revealing their mechanisms inevitably involves fluid mechanics. Computational fluid mechanics techniques are developing to a higher level today with the flourishing of computer science. It is able to...
Poster
Full-text available
The 2023 FOURTH International Conference on Advanced Computational and Communication Paradigms (ICACCP) will be held at Sikkim Manipal Institute of Technology (SMIT) during 16-18 February 2023. Organized by the Department of Computer Science and Engineering, SMIT.It will cover areas of research and development in advanced computation, communication...
Article
Full-text available
Business process modeling (BPM) is a field of computer science that can be used by every organization to maintain its workflow pattern. Adopting this can significantly improve the workflow and can identify problems with the workflow in terms of resource optimization. In this article, the idea of representing the business processes of a Bangladeshi...
Article
Full-text available
Studies have shown evolution strategies (ES) to be a promising approach for reinforcement learning (RL) with deep neural networks. However, the issue of high sample complexity persists in applications of ES to deep RL over long horizons. This paper is the first to address the shortcoming of todays methods via a novel neuroevolutionary multitasking...
Book
Full-text available
This book includes selected papers from the International Conference on Next Generation of Internet of Things (ICNGIoT 2022), organized by Department of Computer Science and Engineering, School of Engineering, GIET University, Gunupur, Odisha, India, during February 3–4, 2022. The book covers topics such as IoT network design and architecture, IoT...
Article
Full-text available
This study dealt with the students’ language profile, metacognitive reading strategies, and reading comprehension performance adopting the descriptive-correlational method of the four hundred forty-six randomly selected students enrolled in the colleges of Forestry, Education, Engineering, Computer Science, and Information Technology in a Philippin...
Poster
Full-text available
RAIDS are open to young talents who are keen to conduct Ph.D. study or research activities as RA/Postdoc/Visiting Scholar in the relevant topics. We seek students with a good academic background in Industrial Engineering, Computer Science, Control and Automation, or Mechanical Engineering. Our research requires excellent mathematical, programming,...
Method
Full-text available
Unraveling the morphological complexity of two-dimensional macromolecules allows researchers to design and fabricate high-performance, multifunctional materials. Here, we present a protocol based on statistical learning to resolve morphological complexity utilizing geometrical, topological, and physical features extracted from the strain energy hea...
Article
Full-text available
Solving real-life problems through mathematical modeling is one of the aims of modern mathematics curricula. For this reason, prospective mathematics teachers need to acquire modeling skills and use these skills in learning environments in terms of creating rich learning environments. With this study, it is aimed to examine the reflections of using...
Article
Full-text available
Functional doppelgängers (FDs) are independently derived sample pairs that confound machine learning model (ML) performance when assorted across training and validation sets. Here, we detail the use of doppelgangerIdentifier (DI), providing software installation, data preparation, doppelgänger identification, and functional testing steps. We demons...
Article
Full-text available
Pairtree is a clone tree reconstruction algorithm that uses somatic point mutations to build clone trees describing the evolutionary history of individual cancers. Using the Pairtree software package, we describe steps to preprocess somatic mutation data, cluster mutations into subclones, search for clone trees, and visualize clone trees. Pairtree...
Article
Full-text available
We used survival analysis to model user disengagement in three distinct questions-and-answering communities in this work. We used the complete historical data from domains including Politics, Data Science, and Computer Science from Stack Exchange communities from their inception until May 2021, including information about all users who were members...
Article
Full-text available
This protocol explains how to take an agent-based model (ABM) with molecular dynamics and set it up to solve the molecular dynamics with a global approach. It can be used to speed up simulations significantly while retaining high levels of accuracy with the original ABM. Two options are presented for implementing this global approach, depending on...
Article
Full-text available
Phase-field simulation is a powerful tool for understanding lithium metal electrodeposition. This protocol outlines the process of numerically solving the phase-field equations using the MOOSE framework. Here, we describe steps to obtain the spatiotemporal distribution of major physical characteristics such as phase-field, ion concentration, overpo...
Article
Full-text available
We developed an approach to decompose neuronal signals into disjoint components, corresponding to task- or event-based epochs. This protocol describes how to project behavioral templates onto a low-dimensional subspace of neuronal responses to derive neuronal templates, then how to decompose and cluster neuronal responses using these derived templa...
Article
Full-text available
The emergency of the pandemic and the absence of treatment have motivated researchers in all the fields to deal with the pandemic situation. In the field of computer science, major contributions include the development of methods for the diagnosis, detection, and prediction of COVID-19 cases. Since the emergence of information technology, data scie...
Article
Full-text available
Complex human activity prediction is a difficult problem for computer science. Simple behaviours can be mapped to sequence prediction algorithms with good results; however, real-world examples of activity are generally stochastic and much more computationally difficult to infer. One method for solving this problem is to utilise contextual data - cl...
Conference Paper
Full-text available
Diabetes mellitus (DM) is an incurable disease and should be submitted to monitoring and control for life. Diabetes is a chronic disease that arises when the pancreas fails to secrete adequate insulin or the insulin hormone produced by the pancreas is not being used efficiently. Diabetes is one of the diseases that are most quickly growing and spre...
Article
Full-text available
The emergency of the pandemic and the absence of treatment have motivated researchers in all the fields to deal with the pandemic situation. In the field of computer science, major contributions include the development of methods for the diagnosis, detection, and prediction of COVID-19 cases. Since the emergence of information technology, data scie...
Preprint
Full-text available
We provide a new multi-task benchmark for evaluating text-to-image models. We perform a human evaluation comparing the most common open-source (Stable Diffusion) and commercial (DALL-E 2) models. Twenty computer science AI graduate students evaluated the two models, on three tasks, at three difficulty levels, across ten prompts each, providing 3,60...
Conference Paper
Full-text available
Highlights • Machine Learning is a very useful solution not only to facilitate analysis but also to save time. • In this paper, basic concepts of the medical field and machine learning will be described. • We will show how data analytics can help in the healthcare process. • We will present some challenges that must be carefully studied to obtain e...
Preprint
Full-text available
Non-additive measures, also known as fuzzy measures, capacities, and monotonic games, are increasingly used in different fields. Applications have been built within computer science and artificial intelligence related to e.g. decision making, image processing, machine learning for both classification, and regression. Tools for measure identificatio...
Preprint
Full-text available
Due to the corona pandemic, numerous courses were held using digital solutions in order to be able to continue teaching. Conventional collaboration tools (Zoom, Big Blue Button, etc.) were used in particular to digitally map a synchronous session for teaching and learning purposes. While these conventional collaboration tools offer a solid basis fo...
Article
Full-text available
Given the importance perceived in the concepts involving high-performance computing, Sergio Arboleda University does not have any computing equipment that allows the students from the Exact Sciences and Engineering School to explore and learn the construction, advantage, and opportunities that this area can offer to their professional growth; besid...
Article
Full-text available
We show in this pedagogical review that far from being an apparent law of physics that stands by itself, the holographic principle is a straightforward consequence of the quantum information theory of separable systems. It provides a basis for the theories of measurement, time, and scattering. Utilizing the notion of holographic screens, which are...
Preprint
Full-text available
Majority vote is a basic method for amplifying correct outcomes that is widely used in computer science and beyond. While it can amplify the correctness of a quantum device with classical output, the analogous procedure for quantum output is not known. We introduce quantum majority vote as the following task: given a product state $|\psi_1\rangle \...
Article
Full-text available
This paper offers a review of Giuseppe Primero’s (2020) book “On the foundations of computing”. Mathematical, engineering, and experimental foundations of the science of computing are examined under the light of the notions of formal, physical, and experimental computational validity provided by the author. It is challenged the thesis that experime...
Article
Full-text available
Interactivity has been a very sought-after feature in professional journalism ever since the media industry transitioned from print into the online space. Within this context, chatbots started to infiltrate the media sphere and provide news organizations with new and innovative ways to create and share their content, with an even larger emphasis on...
Presentation
Full-text available
The introduction of container technology has significantly altered contemporary software development. Modern software developers are adopting Docker containers to increase the security, flexibility, and emulation of different processor architectures. In this talk, Pedro will share my personal experience and demonstrate how easy it is to incorporat...
Technical Report
Full-text available
Quantum computing is probably the next major step in computer science which may well result in a reformulation of many important computational problems and also in the extension of the complexity class hierarchy. This can be attributed to the fundamental properties of superposition and entanglement. This report briefly reviews one of the seminal pa...
Presentation
Full-text available
This is 14TH Conference in the row and technically sponsored by IEEE USA and selected papers shall be published in IEEE Xplore. On the behalf of the Department of Mathematics, Statistics, and the Department of Actuarial Science and Financial Risk Management with courtesy of the Dean CBM-IoBM and the Dean CCSIS-IoBM. It is a great honor for me to...
Article
Full-text available
COVID-19 has magnified the need for online deliveries in higher education. This has further driven the necessity to create innovative learning and teaching tools to engage and motivate students. Further innovations can also assist in the training of practitioners to deliver quality health remotely. This panel will introduce virtual learning tools u...
Article
Full-text available
Este artigo apresenta os resultados obtidos na realização de 7 minicursos online, por parte do grupo PET Ciência da Computação, da Universidade Federal de Santa Maria (UFSM). Estes minicursos foram realizados em parceria com as prefeituras deCangaçu e de Santa Maria e seus ministramentos ocorreram na plataforma Google Classroom, onde aulas gravadas...
Article
Full-text available
Curriculum mapping in Australia has grown from early notions of constructive alignment to a governed ongoing commitment by institutions to the curriculum structures they have developed. These consider primary aspects of a degree: learning outcomes and how they are achieved. In this paper I describe the need for a descriptive set of mappings for sec...
Article
Full-text available
The concept of metric dimension is widely applied to solve various problems in the different fields of computer science and chemistry, such as computer networking, integer programming, robot navigation, and the formation of chemical structuring. In this article, the local fractional metric dimension (LFMD) of the cycle-based Sierpinski networks is...
Presentation
Full-text available
Lorsque l’ambition est de développer une plateforme éducative, articuler le numérique et le pédagogique peut consister à adopter une démarche itérative de conception pour adapter l’artefact aux besoins des utilisateurs. Cette démarche peut être décrite comme un apprentissage croisé entre concepteurs et utilisateurs (Hatchuel, 1996). L’évolution de...
Article
Full-text available
Bootcamps são, em geral, um estudo intenso sobre determinado conteúdo, com o intuito de absorvê-lo, sendo tal didática altamente atrativa ao otimizar o tempo de estudo. O presente artigo tem como objetivo descrever o projeto de extensão "Bootcamp de Algoritmos'' realizado pelo grupo PET X. Este projeto teve como objetivo condicionar um melhor ensin...
Article
Full-text available
This research focusses on the links between online communication environments in university teaching contexts and supporting students in their professional identity formation. The online communication environments studied have been formed with Discord (https://discord.com) to complement the learning management system by providing informal chat-base...
Preprint
Full-text available
The $k$-means is one of the most important unsupervised learning techniques in statistics and computer science. The goal is to partition a data set into many clusters, such that observations within clusters are the most homogeneous and observations between clusters are the most heterogeneous. Although it is well known, the investigation of the asym...
Article
Full-text available
The efficient discovery of frequent itemsets from a transaction database is the fundamental step for association rule mining in data analytics. Interesting associations among the items present in a transaction database contribute to knowledge enrichment. Thus, decision-making and pattern generation from the massive amounts of data become effortless...
Article
Full-text available
Divide-and-conquer dividing by a half recurrences, of the form x n = a · x ⌈ n / 2 ⌉ + a · x ⌊ n / 2 ⌋ + p ( n ) , n ⩾ 2 , appear in many areas of applied mathematics, from the analysis of algorithms to the optimization of phylogenetic balance indices. These equations are usually “solved” by means of a Master Theorem that provides a bound for the g...
Preprint
Full-text available
This article combines humanistic "data critique" with informed inspection of big data analysis. It measures gender bias when gender prediction software tools (Gender API, Namsor, and Genderize.io) are used in historical big data research. Gender bias is measured by contrasting personally identified computer science authors in the well-regarded DBLP...
Article
Full-text available
The performance of a permissioned blockchain, namely, Hyperledger Fabric, is modeled and analyzed in a quantitative manner in this paper. Various types of nodes contribute to the performance of Hyperledger Fabric, and each of those is modeled and tracked along the operational flow of the permissioned blockchain. There are nodes for endorsement, ord...
Preprint
Full-text available
Developing interactive software, such as websites or games, is a particularly engaging way to learn computer science. However, teaching and giving feedback on such software is time-consuming -- standard approaches require instructors to manually grade student-implemented interactive programs. As a result, online platforms that serve millions, like...
Preprint
Full-text available
Dominating sets and resolving sets have important applications in control theory and computer science. In this paper, we introduce an edge-analog of the classical dominant metric dimension of graphs. By combining the concepts of a vertex-edge dominating set and an edge resolving set, we introduce the notion of a vertex-edge dominant edge resolving...
Article
Full-text available
This paper presents a property-directed approach to verifying recurrent neural networks (RNNs). To this end, we learn a deterministic finite automaton as a surrogate model from a given RNN using active automata learning. This model may then be analyzed using model checking as a verification technique. The term property-directed reflects the idea th...
Article
Full-text available
Pipe bursts in water distribution systems (WDSs) lead to large water losses, pollution risks, and public discontent, attracting widespread attention from researchers and water utilities around the world. This study provides insights into the knowledge structure and emerging trends of pipe burst research from a bibliometrics perspective. We used 845...
Conference Paper
Full-text available
Apstrakt Razvojem računarskih nauka, a time i računarskih mreža, u prvom redu Interneta, kao i sve većom upotrebom informaciono komunikacione tehnologije u poslovanju kompanija, ustaljuje se jedan novi oblik poslovanja, pa time i ekonomije. Već nekoliko godina računarstvo je visoko rangirano u političkim agendama u Evropi i svijetu. Evropska komisi...
Article
Full-text available
Subject area classification is an important first phase in the entire process involved in bibliometrics. In this paper, we explore the possibility of using automated algorithms for classifying scientific papers related to Artificial Intelligence at the document level. The current process is semi-manual and journal-based, a realisation that, we argu...
Preprint
Full-text available
Swarm intelligence is a discipline that studies the collective behavior that is produced by local interactions of a group of individuals with each other and with their environment. In Computer Science domain, numerous swarm intelligence techniques are applied to optimization problems that seek to efficiently find best solutions within a search spac...
Preprint
Full-text available
Counting the number of homomorphisms of a pattern graph H in a large input graph G is a fundamental problem in computer science. There are myriad applications of this problem in databases, graph algorithms, and network science. Often, we need more than just the total count. Especially in large network analysis, we wish to compute, for each vertex v...
Article
Full-text available
Gender representation inequality occurs across various STEM sub-disciplines. For example, the sub-disciplines of computer science and engineering are male-dominant, while psychology and biological sciences are female-dominant. One possible cause of this gender inequality is the STEM professional stereotype; created, in large part, by media portraya...
Article
Full-text available
There are many branches within Computer Science, one of them is the Computational Complexity Theory, which studies problems that require the implementation of an algorithm used to solve one or many calculations. Even if an algorithm can solve a problem, it might not be feasible to use due to the high computational cost that the algorithm requires [...
Article
Full-text available
The 15th International Computer Science Symposium in Russia (CSR 2020) was organized by the Ural Federal University located in Ekaterinburg, Russian Federation [...]
Article
Full-text available
Network diffusion processes or how information spreads through networks have been widely examined in numerous disciplines such as epidemiology, physics, sociology, politics, or computer science. In this paper, we extend previous developments by considering a generalization of the diffusion by considering the possibility of differences in the speed...
Article
Full-text available
Whereas researchers regard high school math and science coursework as the best indicator of college readiness for students in the United States, computer science coursework and its relationship to college attendance, particularly for minoritized students, have not received due attention despite its root in the mathematical and scientific reasoning...
Preprint
Full-text available
The present paper reviews and discusses work from computer science that proposes to identify concepts in internal representations (hidden layers) of DNNs. It is examined, first, how existing methods actually identify concepts that are supposedly represented in DNNs. Second, it is discussed how conceptual spaces -- sets of concepts in internal repre...
Book
Full-text available
Research Topics for System Analysis in Computer Science: 378 Potential Research Titles
Conference Paper
Full-text available
The field of Data science and machine learning is young in Nigeria as most universities, colleges and polytechnics do not offer Data science at undergraduate level. This means potentials data scientist comes from statistics, mathematics and computer science fields. One of the major challenges will have seen from experience of teaching machine learn...
Article
Full-text available
Natural language processing (NLP) is an interdisciplinary subject of linguistics and computer science, which processes the language used for human communication into a machine language that can be understood by machines.The task of information extraction is to obtain target information accurately and quickly from a large amount of data and improve...
Article
Full-text available
Contemporarily, with the rapid development of the computer science, the calculation ability has been boosted a lot, which paves a path for carrying out simulations with random variable. In this case, Monte-Carlo simulations can be easily achieved with the state-of-art techniques. As one of the useful statistical tools, Monte-Calo simulation can be...
Article
Full-text available
A growing aging population across the world signifies the importance of smart homes equipped with appropriate technology for the safety and health of older adults. Well-designed smart homes can increase the desire of older adults’ aging-in-place and bring economic benefits to the country by reducing budgets for care providers. To obtain a structura...
Preprint
Full-text available
We introduce the $k$-bonacci polyominoes, a new family of polyominoes associated with the binary words avoiding $k$ consecutive $1$'s, also called generalized $k$-bonacci words. The polyominoes are very entrancing objects, considered in combinatorics and computer science. The study of polyominoes generates a rich source of combinatorial ideas. In t...
Article
Full-text available
The motive of the study of Frontiers of Artificial Intelligence (AI) is to get a brief idea about the aspects of the theoretical approach in the field of AI after a decade. Artificial Intelligence can be defined as the field of computer science that automates machines to behave and act like humans using a set of roots and algorithms. The topics of...
Preprint
Full-text available
A major concern of Machine Learning (ML) models is their opacity. They are deployed in an increasing number of applications where they often operate as black boxes that do not provide explanations for their predictions. Among others, the potential harms associated with the lack of understanding of the models' rationales include privacy violations,...
Article
Full-text available
Artificial Intelligence is a branch of computer science which aims to have a computer performs what normally is considered as intelligent (human) behaviour. Games have played an important role in Artificial Intelligence, because game playing is considered as a typically intelligent task with limited possibilities and clearly defined rules. The fami...
Article
Full-text available
Anonymous peer review is used by the great majority of computer science conferences. OpenReview is such a platform that aims to promote openness in peer review process. The paper, (meta) reviews, rebuttals, and final decisions are all released to public. We collect 11,915 submissions and their 41,276 reviews from the OpenReview platform. We also co...
Experiment Findings
Full-text available
Résumé de thèse pour l’obtention de grade de docteur en informatique, option sécurité réseaux, université de Pretoria, Afrique du Sud
Article
Full-text available
Gödel’s Dialectica interpretation was designed to obtain the consistency of Peano arithmetic via a proof of consistency of Heyting arithmetic and double negation. In recent years, proof theoretic transformations (the so-called proof interpretations) based on Gödel’s Dialectica interpretation have been used systematically to extract new content from...