Science topics: Computer Science
Science topic
Computer Science - Science topic
Explore the latest publications in Computer Science, and find Computer Science experts.
Publications related to Computer Science (10,000)
Sorted by most recent
The growing use of technology in education generates massive amounts of data every day, attracting scholars worldwide. Educational data mining is growing quickly and may use cutting-edge machine learning and data mining methods and approaches. Advanced data mining techniques can help understand students, particularly computer science students, and...
We have explored the design principles of noncanonical bistable switches using high-throughput bifurcation analysis of positive feedback loops under dual signaling. Here, we present a protocol to carry out bifurcation analysis using pseudo-potential energy of the dynamical system. We also describe steps to perform automated parameter searching for...
Self-regulated learning (SRL) is important for computer science education. Yet, students often do not have SRL skills to benefit their learning. In this study, we examined 187 (n=187) students' SRL behaviors while they built programs with an automated feedback tool. Anchored in Winne and Hadwin's (1998) COPES model of SRL, our results showed that n...
This paper is dedicated to the memory of Professor Alexander Vasilevich Mikhalev one of the most significant representatives of the Moscow School of Algebra and
Computer Science, and was one of the last giants – a real scientific rock of the Department of Higher Algebra of Lomonosov Moscow State University.
The article analyzes the research of scientists and State regulatory documents on the concept of key information and communication competence. According to the conducted analysis, the information and communication competence of a primary school student involves mastering the basics of digital literacy; the ability to safely and ethically use inform...
The segmentation and extraction on color features can provide useful information for many different application domains. However, most of the existing image processing algorithms on feature extraction are gray image-based and consider only one-dimensional parameters. In order to carry out a fast and accurate color feature extraction, this paper pro...
Quantum mechanics (QM) can be understood as a set of rules that forms the basis for developing all quantum theories. One of these theories is quantum computation (QC), i.e., computation based on QM logic. It is believed that QC provides paths to the problem solution that may not be possible for classical computers. Therefore, it has received attent...
It is significant to predict welding quality during gas metal arc welding process. The welding defect detection algorithm has been developed based on convolutional neural network (CNN). The sensing system and image processing algorithm for molten pools has been developed. It overcomes the interference caused by the arc light to obtain clear images...
This study investigates the experiences and motivations of Saudi Arabian computer science students (aged 18 and above) in their pursuit of knowledge in Artificial Intelligence (AI). It employs a cross-sectional design using web-based surveys. Findings indicate that students recognize AI's transformative potential in computer science and express a w...
Trend of overseas study emerged as more students compete for a better education and seek more opportunities in foreign countries like the US and UK. As a fast-developing country, China shows an apparent trend of overseas study. There is an increased trend of Chinese overseas students throughout time. Through many investigations and interviews condu...
This paper studies the matrix-scaled resilient consensus problems over multi-agent networks as occurring in computer science and distributed control. Unlike existing works on consensus problems, where the states of agents converge to a common value or reach some prescribed proportions, we take a more general matrix-scaled approach to accommodate th...
AI-powered education technologies can support students and teachers in computer science education. However, with the recent developments in generative AI, and especially the increasingly emerging popularity of ChatGPT, the effectiveness of using large language models for solving programming tasks has been underexplored. The present study examines C...
Sometimes there are clear and natural limits to the scope of action of a science, and in other cases they are simply convenient ones. Geographic Information Science (GISc) is a transversal science, with contacts with all geosciences but also with various formal sciences such as Mathematics, Logic and Computer Science. A first approach to specifying...
Jun Cui Keya Han Lin Sha- [...]
Guangxu Li
Network flow watermark technology is a traffic marking technique that embeds watermark information into the characteristics of network flows to mark and trace attack flows generated by network attackers. However, with the development of network attack techniques, the time and number of packets required for network attacks have decreased. Existing n...
Статья посвящена изучению заимствования как основной способ образования терминов в области информатики и нанотехнологии. В исследовании рассматривается роль данного способа в обогащении лексического состава подъязыков информатики и нанотехнологии. Выявлено в статье, что в формировании лексики информатики и нанотехнологий участвуют два основных исто...
In the realm of computer science, the speed and efficiency of data processing vary depending on the chosen algorithms and programming languages. This article delves into an exploration of which combinations can yield the highest overall performance. Starting with an introduction to the selected algorithms and languages, the underlying mathematical...
Usable security involves designing security measures that accommodate users' needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. Numerous studies have addressed this balance. These studies, spanning psychology and...
Objective
The objective of this study was to evaluate the effectiveness of deep learning methods in detecting dental caries from radiographic images.
Methods
A total of 771 bitewing radiographs were divided into two groups: adult (n = 554) and pediatric (n = 217). Two distinct semantic segmentation models were constructed for each group. They were...
This studi aims to determine the effect of students’ attitudes on learning outcomes of mathematical logic and to determine how much influence students’ attitudes have on learning outcomes of mathematical logic The research sample consisted of third semester students of the computer science engineering program who took the mathematical logic course....
The central mathematical tool discussed is a non-standard family of polynomials, univariate and bivariate, called Abel-Goncharoff polynomials. First, we briefly summarize the main properties of this family of polynomials obtained in the previous work. Then, we extend the remarkable links existing between these polynomials and the parking functions...
Frameworks for Integrated Project-Based Instruction in STEM Disciplines presents an original approach to Science, Technology, Engineering, and Mathematics (STEM) centric project based instruction. We approach project based instruction from an engineering design philosophy and the accountability highlighted in a standards-based environment. We empha...
The problem of finding a maximum size matching in a graph (known as the maximum matching problem) is one of the most classical problems in computer science. Despite a significant body of work dedicated to the study of this problem in the data stream model, the state-of-the-art single-pass semi-streaming algorithm for it is still a simple greedy alg...
This article is a preprint and the published version might be different. It explores the health data commodification phenomenon in the European Union's digital market. The emergence of a health marketplace and the increasing utilization of health data by both public and private entities have raised significant concerns about citizens' rights. This...
Society for Research Development (SRD) www.socrd.org
Opportunity for academicians from European, UK, USA and Australian universities having PhD in Computer Science with minimum 10 years of research experience
Join the Technical Programme Committee of SRD to review maximum 03 papers and chance to get invited as Speaker, Co-Chair, Session Chair.
K...
A description is given of the first outcomes of creating a classification of transformations of objects of an informatics subject domain. Informatics describes as a component of the system of scientific knowledge, covering a wide range of information and computer sciences. The boundaries of its subject domain, which is thus significantly expanded,...
Artificial Intelligence (AI) is a rapidly growing field that encompasses various disciplines, including mathematics, engineering, computer science, philosophy, and linguistics. It has significantly impacted various sectors, including education, by addressing issues such as content accessibility and teacher deficiency. AI implementation and adoption...
CSIT IT Computer Science Information Technology Report Thesis Internships
Computational Thinking (CT) is an important ability in solving complex problems in the era of industrial revolution 4.0. This research aims to determine student learning outcomes in local wisdom-based computational thinking diagnostic tests in information technology research learning using CBT. This type of research is quantitative research with a...
Along with more and more extensive application in architecture, the generative design method has a great potential for development. Based on the original architecture model, it takes programming and algorithms as the core, and it is a combination of modern architecture theory and computer science method. In this paper, a method to construct the sel...
To create a program on Python for finding the quantity of ingredients of making concrete for the slab.
Within the field of social reintegration and re-education, this paper presents an educational experience carried out at the Iquitos Penitentiary Center, Lima, Peru, with the aim of providing an introduction to informatics to 25 inmates who volunteered to take part in the project. Twenty students and a teacher from the Scientific University of the S...
Boolean algebra is a branch of mathematics that has many applications, especially in computer science, engineering, and information technology. Boolean algebra is one of the materials taught in discrete mathematics courses. However, students still feel that this material is quite difficult. Therefore, the solution to this problem is to analyze/desc...
Quantum realizations have opened a new ways for computer science. The new characteristics and phenomenons allow us to create new algorithms for general proposes. An interesting topic is random number generation. There are two perspectives for this proposes. True random numbers generator (TRN) and pseudo random numbers generator (PRNG). True Random...
The importance of Computer education is widely acknowledged across the world. It is envisioned as a 21st-century skill and is considered a cornerstone for the success of students in their careers. Computer education is somewhat focusing directly on the development of computational thinking skills among students. The present study aims to explore ho...
What is Artificial Intelligence and how can horses benefit?
In very basic terms, artificial intelligence is a branch of computer science that aims to create intelligent machines that work and react like humans. If you’re already thinking of AI in Ex Machina terms, let me stop you. We’re not talking a takeover of humanoid robots—not yet anyway. We’r...
El libro resulta de debates entre la Universidad Tecnológica de Morelia, la Facultad de Letras de la Universidad Michoacana y Posdoctorados del CONAHCYT sobre Inteligencia Artificial en Ciencias de la Computación. Explora la influencia de las Inteligencias Artificiales en la Cultura Visual Contemporánea, convocando a investigadores de diversas área...
With the increasing complexity of the shortwave communication environment, the efficiency and accuracy of the manual detection of Morse code no longer meet actual needs. Therefore, this paper proposes a Morse code detection algorithm called YFDM. For the time–frequency image of the received signal, a combination module of deformable convolution and...
Many problems of practical interest can be modeled and solved by using interval-valued fuzzy graph (IVFG) algorithms. An IVFG is a very useful and effective tool for studying various calculations, fields of intelligence, and computer science, such as networking, imaging, and other fields, such as biological sciences. In different applications, they...
Background and aim: The combination of ontology-based retrieval systems leads to the semantic retrieval of words. The aim of this study was to review ontology articles in information retrieval using scientometric techniques.
Materials and methods: The present study was conducted using the documentary method and word cluster analysis. The research p...
Book name: Research and Applications Towards Mathematics and Computer Science
In computer science education, various teaching and learning methods exist to teach novice students programming. However, students' source code primarily serves as the basis for grading. Usually, it is not considered to identify key concepts and skills required to complete the course and understand the student's learning process. This paper present...
For a special class of three unicast sessions, in which the maximum flow from each sender to each receiver is the same positive integer k, a network coding approach is proposed. A multigeneration mixed strategy, in which (2 × n + 1) consecutive generations are taken as a mixed set, is adopted. The precoding strategy is adopted at the senders, rando...
The course, theory of computation, appears in many computer science bachelor's degree program curricula. The course examines mathematical proofs based on strictly defined abstract models of computation. Many students who take the course may be accomplished programmers, but they often have limited mathematical training. So, when such students attemp...
Comics are a bimodal form of art involving a mixture of text and images. Since comics require a combination of various cognitive processes to comprehend their contents, the analysis of human comic reading behavior sheds light on how humans process such bimodal forms of media. In this paper, we particularly focus on the viewing times of each comic p...
Pattern matching algorithms have gained a lot of importance in computer science, primarily because they are used in various domains such as computational biology, video retrieval, intrusion detection systems, and fraud detection. Finding one or more patterns in a given text is known as pattern matching. Two important things that are used to judge h...
Artificial intelligence (AI) was introduced in medicine to make some difficult decision-making regarding diagnostics and/or treatments easy. Its application derives from the improvement of information obtained with computer sciences and informatics, in particular with information derived by algorithms obtained with special informatics support as ma...
Numbers satisfying a class of triangular arrays, defined by a bivariate first-order linear difference equation with linear coefficients, include a wide range of combinatorial numbers: binomial coefficients, Morgan numbers, Stirling numbers of the first and the second types, non-central Stirling numbers, Eulerian numbers, Lah numbers, and their gene...
This study presents a new algorithm for calculating the greatest common divisor (GCD) of two or more integers. The GCD is an important mathematical concept that represents the largest positive integer that divides the given integers without leaving a remainder. The new algorithm is designed to be more efficient and effective compared to existing me...
Since the definition of matrices in 1855, matrix multiplication has played a crucial role in a wide range of fields. Over the years, numerous researchers have dedicated their efforts to improving the time complexity of this fundamental operation. This paper aims to delve into the historical development of matrix multiplication algorithms and method...
O trabalho a seguir realiza uma análise exploratória de dados com a finalidade de compreender o perfil do curso e seus índices de insucessos nas disciplinas. Este trabalho tem como objetivo auxiliar os membros do conselho, bem como a coordenação do curso, para realizar o planejamento visando a tomada de decisão, utilizando a linguagem Python, por m...
This paper critically evaluates the work of Louiz Akram in his publication titled "A Proof That the Set of NP-Problems is Bigger Than the Set of P-Problems." While the author tackles a fundamental question in computational complexity, the critique highlights significant shortcomings in the logical foundations and depth of research presented in Akra...
The YOLOv4 approach has gained significant popularity in industrial object detection due to its impressive real-time processing speed and relatively favorable accuracy. However, it has been observed that YOLOv4 faces challenges in accurately detecting small objects. Its bounding box regression strategy is rigid and fails to effectively leverage the...
The COVID-19 pandemic led to a substantial increase in the volume, diversity, and output pace of healthcare data. Countries depended on traditional methods to monitor diseases and public health to manage the epidemic, while advanced technology such as artificial intelligence and computation enabled efficient data processing. That datasets are usual...
Trust can be considered as a multidisciplinary concept, which is strongly related to the context and it falls in different fields such as Philosophy, Psychology or Computer Science. Trust is fundamental in every relationship, because without it, an entity will not interact with other entities. This aspect is very important especially in the Interne...
Finding the complete functional circuits of neurons is a challenging problem in brain research. Here, we present a protocol, based on visual stimuli and spikes, for obtaining the complete circuit of recorded neurons using spike-triggered nonnegative matrix factorization. We describe steps for data preprocessing, inferring the spatial receptive fiel...
Fully automated techniques using convolutional neural networks for cephalometric landmark detection have recently advanced. However, all existing studies have adopted X-rays. The problem of direct exposure of patients to X-ray radiation remains unsolved. We propose a model for detecting cephalometric landmarks using only facial profile images witho...
The integer factorization problem is a major challenge in the field of computer science, and Shor’s algorithm provides a promising solution for this problem. However, Shor’s algorithm involves complex modular exponentiation computation, which leads to the construction of complicated quantum circuits. Moreover, the precision of continued fraction co...
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves. These sequences have a number of exciting properties and can be used to build new encryption systems. This...
Рассмотрены методы аналитического решения заданий № 22 ЕГЭ по информатике на нахождение критического пути образца демонстрационного варианта ЕГЭ по информатике 2023 г.: с использованием таблицы, графа, диаграммы Ганта. Показаны преимущества и недостатки рассматриваемых методов, их связь с формированием универсальных компетентностей. Решение нового...
Background
Self‐assessment serves to improve learning through timely feedback on one's solution and iterative refinement as a way to improve one's competence. However, the complexity of the self‐assessment process is widely recognized, as well as that students can benefit from it only if their assessment is accurate enough.
Objectives
In order to...
This study aims to develop a system for automatically correcting spelling errors in Persian texts using two approaches: one that relies on rules and a common spelling mistake list and another that uses a deep neural network. The list of 700 common misspellings was compiled, and a database of 55,000 common Persian words was used to identify spelling...
Рассмотрены метод решения задания № 22 демонстрационного варианта контрольных измерительных материалов единого государственного экзамена 2024 г. по информатике с использованием диаграммы Ганта, а также полезная для решения обновлённого задания функциональность электронных таблиц. / The method for solving task No. 22 of the demonstration version of...
Presently, humanity has entered the era of big data, where artificial intelligence (AI) technology has found extensive application across various industries and domains. Notably, in the field of computer network technology, its utilization has significantly elevated the technological prowess of computer science, propelling computer systems towards...
ChatGPT is an advanced large language model (LLM) capable of generating code to solve specific problems when presented with carefully designed prompts, among other capabilities. The existence of ChatGPT raises signifi-cant questions regarding teaching practices and evaluations within the dis-cipline. If ChatGPT can effectively solve exercises assig...
Road crack detection is an important indicator of road detection. In real life, it is very meaningful work to detect road cracks. With the rapid development of science and technology, especially computer science and technology, quite a lot of methods have been applied to crack detection. Traditional detection methods rely on manual identification,...
The research suggests a method to improve the present pulse coupled neural network (PCNN), which has a complex structure and unsatisfactory performance in image denoising and image segmentation. Then, a multi strategy collaborative improvement whale optimization algorithm (WOA) is proposed, and an improved whale optimization algorithm (IWOA) is con...
Background
The motivational climate within a course has been shown to be an important predictor of students’ engagement and course ratings. Because little is known about how students’ perceptions of the motivational climate in a computer science (CS) course vary by sex, race/ethnicity, and academic major, we investigated these questions: (1) To wha...
Existing low-light image enhancement techniques face challenges in achieving high visual quality and computational efficiency, as well as in effectively removing noise and adjusting illumination in extremely dark scenes. To address these problems, in this paper, we propose an illumination enhancement network based on Retinex theory for fast and acc...
A description of the first outcomes of creating a scientific paradigm of informatics, consolidating a wide range of information and computer sciences, is given. The subject domain of informatics is considered within the framework of the concept of polyadic computing by Paul Rosenbloom. The main goal of the work is to construct fragments of the uppe...
There are many parents of young talented and gifted children or adolescents, who insist on the traditional path of studies both for their sons and their daughters. These parents have been good students in most cases, and they believe, that their own "success track"-the educational way they had gone through, is the only one ensuring the materializin...
In this paper, we propose a solution to resolve the limitation of deep CNN models in real-time applications. The proposed approach uses multi-threshold binarization over the whole multi-spectral remote sensing image to extract the vector of discriminative features for classification. We compare the classification accuracy and the training time of t...
The research regarding Deepfakes has been developing at a faster pace as technology to simplify the process becomes more accessible with the use of Artificial Intelligence (A.I.). Deepfakes are a part of the Fake News area of interest and, as such, have just as much impact on the current era of the Internet as the other parts that make up Fake News...
The Robin sequence is a congenital anomaly characterized by a triad of features: micrognathia, glossoptosis, and airway obstruction. This comprehensive historical review maps the evolution of approaches and appliances for its treatment from the past to the current modern possibilities of an interdisciplinary combination of modern engineering, medic...
Natural Language Processing (NLP) is the area of computer science in which a machine learns to interact with humans using text. Given a text, human beings can easily read and understand it, but for machines it is still a challenging problem. The field of NLP is gaining a lot of attention from researchers these days due to emergence of deep pre-trai...
Online judge (OJ) systems are essential in programming education as they efficiently evaluate learners’ programming skills and reduce instructor workload. However, these systems often overlook the importance of software-testing concepts. To address this gap, we developed a system called Pytutor that integrates software-testing concepts to assess le...
Artificial intelligence has been categorized as a subfield of computer science wherein machines perform smart learning tasks with the help of data and statical methods. Agriculture is one of the oldest social activities performed by humans. It provides many crucial things like raw materials, food, and employment. Due to the increasing population, i...
Over recent years, computer science (CS) teachers and instructor have faced several challenges in assisting students to strengthen their understanding of programming. To make matters worse, existing assessment methods could be more effective in assessing students' programming skills and knowledge, thus entailing a review of issues surrounding the i...
Otimização global é um ramo da matemática aplicada que tem como objetivo encontrar o valor ótimo de uma ou mais funções objetivo sob um determinado conjunto de restrições. Diversos problemas em engenharia, biologia, química e ciência da computação, dentre outras áreas, são modelados como problemas de otimização global. As meta-heurísticas destacam-...
Binary search trees (BSTs) are one of the most important data structures in the field of computer science. We may easily write a parallel construction program of a BST by extending the sequential algorithm straightly. However, in such conventional approaches, the order of nodes inserted into a BST is determined dynamically, depending on the occasio...