Science topic

Computer and Society - Science topic

Explore the latest publications in Computer and Society, and find Computer and Society experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Computer and Society (2,593)
Sorted by most recent
Chapter
Full-text available
various modeling languages of the time, thus becoming the universal language for systems modeling, currently the UML is in the current version 2.5 .1 as informed by the Object Management Group (OMG), the objective of this work is to present software modeling using the UML, presenting some important concepts of the diagrams such as: Use Case Diagram...
Article
Full-text available
The work All to Sand Returns (2022) is an audiovisual installation created by the duo open.circuit (Assunta Alegiani and Pedro Ferreira) that follows an abstract sci-fi narrative to speculate on the consequences of the rise of the sea level and global warming in a near future influenced by the growth of the computational networked world. As a thoug...
Conference Paper
Full-text available
In the present era, data plays a crucial role across various disciplines, serving as the foundation for exploration and advancements. However, in the domain of eHealth, a readily available dataset for training AI models to predict cardiac arrest using the internet of medical things (IoMT) is lacking. To bridge this gap, this research article addres...
Article
Full-text available
With the rapid growth of cloud computing services, the high energy consumption of cloud data centers has become a critical concern of the cloud computing society. While virtual machine (VM) consolidation is often used to reduce energy consumption, excessive VM consolidation may lead to local hot spots and increase the risk of equipment failure. One...
Conference Paper
Full-text available
Social media are developing into the most important collaborative bottom-up interaction and multi-way communication tools among individuals for discussion, knowledge sharing, comments and ratings, content and information creation and exchange. Social media tools are rapidly changing the landscape of collaboration, communication, knowledge creation,...
Article
Full-text available
Unlabelled: It has been shown that unsupervised outlier detection methods can be adapted to the one-class classification problem (Janssens and Postma, in: Proceedings of the 18th annual Belgian-Dutch on machine learning, pp 56-64, 2009; Janssens et al. in: Proceedings of the 2009 ICMLA international conference on machine learning and applications,...
Conference Paper
Full-text available
Aspects of software quality (SQ), such as process and product metrics, and assessment techniques, can be taught to computing students during their undergraduate courses, however, there is no consensus on how. In Brazil, computing courses are structured as the Brazilian Computer Society suggests, still, researchers point out that there are few SQ su...
Article
Full-text available
The computer society uses a variety of automated methods for file security and data storage. Several organisations are concerned about the information exchange via an unsecured network for a distributed architecture, such as the time-sharing and real-time system. Probably the most crucial element that contributes to effective security is cryptograp...
Conference Paper
Full-text available
Preface This volume contains the papers presented at ITED 2022: Information Technology for Education and Development held on 1-3 rd Novermber 2022 in ABUJA, Nigeria. On behalf of the organizing committee, it is my honor to welcome you to ITED22. After previous editions with the IEEE consultants' network and Computer society, we are finally able to...
Article
Full-text available
Video conferencing has enabled synchronous communication in a classroom and created multi-sensory content to stimulate learners. Artificial intelligence involves complex equations that are better taught using a constructive pedagogy where students experiment with alternative ways of solving the same problem. Multiple-choice questions have high reli...
Article
Full-text available
The demand for cloud storage services continuously increases putting at risk the privacy of the outsourced data. Data encryption is the obvious solution, a well-studied and mature technology. However, it does not support search queries on encrypted data and the server cannot process the outsourced data in their protected form. To counteract this pr...
Article
Full-text available
I am delighted to introduce the inaugural volume of the IEEE Transactions on Machine Learning in Communications and Networking (TMLCN), which is an interdisciplinary journal supported by the IEEE Communications Society, the IEEE Signal Processing Society, the IEEE Vehicular Technology Society, and the IEEE Computer Society. The relationship between...
Conference Paper
Full-text available
CONTEXT Professional skills have become increasingly important in software engineering education; however, this is not always reflected in today’s teaching curricula (Petkovic et al., 2017). The Australian Computer Society report states software engineering and ICT students are lacking essential lifelong non-technical skills necessary to create suc...
Chapter
Full-text available
In 1996, the famous scholar Ajtai proposed the reduction principle from the worst case to the average case at the 28th Summer Symposium of the American Computer Society (ACM), named the Ajtai reduction principle [see Ajtai (1996), Ajtai (1999) and Ajtai and Dwork (1997)]. Subsequently, Ajtai and Dwork presented the first lattice-based cryptosystem,...
Conference Paper
Full-text available
Ethics and Information and Computer Systems Security go hand in hand. Security is related to freedom from risk or the threat of change for the worse and is directly associated with moral values and evaluation. In Brazil, the largest and most important event related to this topic is the Brazilian Symposium on Information and Computational Systems Se...
Book
Full-text available
This text was written as part of the mini-course presented at the Information Technology Update Journey at the 1996 Brazilian Computer Society Congress. The objective of this mini-course is to provide a comprehensive view of the area of Artificial Neural Networks, presenting from the philosophical issues involved in the approach, through the theore...
Article
Full-text available
The usage of IoT and robots is more and more present in smart farming, and in particular in agro-ecology since robots are able to provide smart practices and avoid repetitive human tasks. However, these new technologies rise several research issues, which are strongly inter-related, about Farm Management Information System, such as robots’ programm...
Article
Full-text available
Adopting the perspective of Peircean semiotics, the work proposes to analyze the concept of disin-formation based on the phenomenon of fake news and the “post-truth” neologism associated with it. We review some contemporary informational theories, which start from the relationship between communication, computing, society and technologies, to demon...
Article
Full-text available
How do individual human minds create languages, legal systems, scientific theories, and technologies? From a cognitive science viewpoint, such collective phenomena may be considered a type of distributed computation in which human minds together solve computational problems beyond any individual. This viewpoint may also shift our perspective on ind...
Article
Full-text available
Background: A systematic literature review (SLR) is a research methodology that examines data and findings of other authors relative to specified research questions (RQ), collects multiple research studies, and summarises them to answer a research question using rigorous methods. Many SLRs have been published on uterine fibroids (UFs) in the last t...
Article
Full-text available
Cramer and Shoup introduced at Eurocrypt’02 the concept of hash proof system, also designated as smooth projective hash functions. Since then, they have found several applications, from building CCA-2 encryption as they were initially created for, to being at the core of several authenticated key exchange or even allowing witness encryption. In the...
Book
Full-text available
"This is an important book. Ethics is not an easy topic, and arguably the ethics of IT is less so—not least due to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . . . Use this book as a practical resource, an informative and educational source of material in developing expertise, but also as an inval...
Preprint
Full-text available
In this paper, we present the Multi-Forgery Detection Challenge held concurrently with the IEEE Computer Society Workshop on Biometrics at CVPR 2022. Our Multi-Forgery Detection Challenge aims to detect automatic image manipulations including but not limited to image editing, image synthesis, image generation, image photoshop, etc. Our challenge ha...
Conference Paper
Full-text available
This article examines artistic practices that engage with digital technologies through a critical making methodology. Critical making is described as a hands- on practice that aims to merge critical thinking with making. This is a practice that focuses on the process of making and combines material experimentation with critical thinking about the e...
Preprint
Full-text available
Authors are invited to submit papers for “2022 International Symposium on Quantum Computing: Circuits Systems Automation and Applications (QC-CSAA)” July 18-19, 2022. The 2022 symposium will occur in virtual/online mode. The previous two successful editions (2020 and 2021) of QC-CSAA have occurred as workshops at the IEEE Computer Society Annual Sy...
Article
Full-text available
Objectives The aim of this study was to identify and characterise the health and social care membership of the British Computer Society (BCS), an international informatics professional organisation, and to determine their ongoing development needs. Methods A prepiloted online survey included items on professional regulatory body, job role, work se...
Presentation
Full-text available
Use the Phases of Team Development (Based on Bruce W. Tuckman's Model of Forming, Storming, Norming, Performing, and Adjourning) to Help Teams Grow and Advance: 2022 Update * * * * * Want happier and more productive teams? Among other things, it takes great leadership. And proven strategies can provide a real edge! That’s where the groundbreaking w...
Poster
Full-text available
I will be speaking at this event alongside The Nigeria honorable Ministers of Education (Mallam Adamu Adamu) and that of Communication and Digital Economy (Prof. Isah Ibrahim Pantami ) on Jan 19, 2022.The event is organized by the National Secretariat of Nigeria Computer Society.
Article
Full-text available
Datox explores the imperceptible electromagnetic radiation generated by elec- tronics and digital technologies as sonic material. The work is a music album and a live performance that creates an audiovisual environment that explores sonic possibilities through the amplification of imperceptible sounds. This aims to highlight a material layer that c...
Conference Paper
Full-text available
Customized product requirements are driving the need for variety oriented assemblies even in collaborative environments between humans and robots. This calls for the need for robots and humans to be intelligent in order to be aware of and adapt to different product needs. To address this, this study presents a novel approach and architecture to rea...
Conference Paper
Full-text available
Disproportionality of gender in Information Technology field is well known. Women are a minority in the academic world, even in a scenario where there are efforts to value female models of success in computing. Reflecting on the historical bias, it can be seen that this fact causes impact on the scientific research development in this field. Scient...
Presentation
Full-text available
The British Computer Society has invited this presentation on Matrices of Sets, in its Interest Group on Formal Aspects of Computing Science (BCS/FACS). Outline: * short reminder of the parallel timeline of development of matrices and set theory, by leading mathematicians as Cayley, Sylvester, Jordan, Hilbert for matrices, and mainly Cantor for se...
Article
Full-text available
Several security solutions have been proposed to detect network abnormal behavior. However, successful attacks is still a big concern in computer society. Lots of security breaches, like Distributed Denial of Service (DDoS), botnets, spam, phishing, and so on, are reported every day, while the number of attacks are still increasing. In this paper,...
Article
Full-text available
Using some nearly forgotten facts, this article reviews the origins of the IEEE Computer Society and the first Technical Committee on Electronic Computers, established about 10 years after the revolutionary invention of electronic digital computing.
Article
Full-text available
The Power of processor increases every time it receives positive inputs that can change the influence of viruses into positive running or their life is decreased by culling. The remains of the viruses need storage where we can review the characteristics, which may evolve again due to genetic reasons over evolution of time. The mutant can be either...
Preprint
Full-text available
With parallel and distributed computing (PDC) now wide-spread, modern computing programs must incorporate PDC within the curriculum. ACM and IEEE Computer Society's Computer Science curricular guidelines have recommended exposure to PDC concepts since 2013. More recently, a variety of initiatives have made PDC curricular content, lectures, and labs...
Article
Full-text available
Our recent work (Ayral et al. in Proceedings of IEEE computer society annual symposium on VLSI, ISVLSI, pp 138–140, 2020. https://doi.org/10.1109/ISVLSI49217.2020.00034) showed the first implementation of the Quantum Divide and Compute (QDC) method, which allows to break quantum circuits into smaller fragments with fewer qubits and shallower depth....
Conference Paper
Full-text available
The necessity of introducing the fundamental concepts of Computingin Brazilian elementary, middle and high school has beenincreasingly discussed by the Brazilian Computer Society (SBC).Nevertheless, to the best of our knowledge, there is no literaturethat explains how these concepts should be applied. This articledescribes how those specific Comput...
Book
Full-text available
Welcome Messages from IEEE BigDataSE 2020 Program Chairs On behalf of the Program Committee of the 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020), we would like to welcome you to join the conference in Guangzhou, China, December 29, 2020 - January 1, 2021. The IEEE BigDataSE 2020 Conference is a forum f...
Article
Full-text available
In [Tense operators on De Morgan algebras, Log. J. IGPL 22(2) (2014) 255–267], Figallo and Pelaitay introduced the notion of tense operators on De Morgan algebras. Also, other notions of tense operators on De Morgan algebras were given by Chajda and Paseka in [De Morgan algebras with tense operators, J. Mult.-Valued Logic Soft Comput. 1 (2017) 29–4...
Preprint
Full-text available
Our recent work (Ayral et al., 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)) showed the first implementation of the Quantum Divide and Compute (QDC) method, which allows to break quantum circuits into smaller fragments with fewer qubits and shallower depth. QDC can thus deal with the limited number of qubits and short coherence time...
Preprint
Full-text available
2nd International Workshop on Quantum Computing: Circuits Systems Automation and Applications (QC-CSAA) in conjuction with the ISVLSI 2021 Website: https://lnkd.in/e29YRVc Authors are invited to submit papers for "2nd International Workshop on Quantum Computing: Circuits Systems Automation and Applications (QC-CSAA)" in conjunction with the IEEE...
Article
Full-text available
We provide a simple and novel algorithmic design technique, for which we call iterative partial rounding, that gives a tight rounding-based approximation for vertex cover with hard capacities (VC-HC). In particular, we obtain an f-approximation for VC-HC on hypergraphs, improving over a previous results of Cheung et al. (In: SODA’14, 2014) to the t...
Book
Full-text available
This book presents new knowledge and recent developments in all aspects of computational techniques, mathematical modeling, energy systems, applications of fuzzy sets and intelligent computing. The book is a collection of best selected research papers presented at the International Conference on “Mathematical Modeling, Computational Intelligence Te...
Article
Full-text available
It is indeed a great honor to be the inaugural Editor-in-Chief of the IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY (OJCS). OJCS is a rigorously peer-reviewed forum for rapid publication of open access (OA) articles describing high-impact results on the latest emerging topics and trends in all areas of interest to the IEEE Computer Society, encompassin...
Conference Paper
Full-text available
The purpose of this paper is to explore the Code of Ethics practices in relation to cybersecurity in the Cloud context relating to small and medium-sized enterprises (SMEs). The study was based on primary data collected via a questionnaire focusing on the Australian Computer Society (ACS) Code of Ethics and its relationship to Cloud computing. The...
Article
Full-text available
Douglas Allswell Kelechi, Cosmas Ifeanyi Nwakanma, Augustine Ikenna Udunwa and Ikenna Uzoma Ajere, "A Survey of Challenges and Opportunities on COVID-19 and Emerging Technologies in Nigeria". African Journal of Computing & ICT (Afr. J. Comp. & ICT) IEEE Nigeria Computer Society partner. volume 13, no 4, December 2020; P-ISSN 2006-1781
Preprint
Full-text available
This study reported the conference papers presented conducted by the two computing societies in the Philippines. Toward this goal, all published conference proceedings from the National Conference of IT Education and Philippine Computing Society Conference were gathered and analyzed using social network analysis. The findings of the study disclosed...
Conference Paper
Full-text available
The paper presents the development of educational activities in the field of computing. Professional associations, primarily the ACM (Association for Computing Machinery) and the CS IEEE (Computer Society Institute of Electrical and Electronics Engineers) have recognized the need to define an educational framework at the level of computing. Over th...
Presentation
Full-text available
Link: http://www.ivpai.org/pages/ivpai2020.html# IVPAI2020 has been held successfully on August 22-23, 2020 at Sheraton Grand Shanghai Pudong Hotel in Shanghai. IVPAI2020 achieved its great success. The scientific program for the event was filled with presentations delivered by researchers and scholars from the international community, including...
Conference Paper
Full-text available
The problem of defining the concept “business analysis in IT project” and scope of business analysis activities are considered. The comparative analysis of three bodies of knowledge on business analysis from leading international institutions International Institute of Business Analysis, Project Management Institute and British Computer Society is...
Chapter
Full-text available
Information and communication technology (ICT) have evolved in today's computing society whose waste causes environmental impacts and compromises sustainability. The objective of this research was to investigate the evolution of communication and information technology about it, and the environmental impacts this has caused on environmental sustain...
Poster
Full-text available
The 10th IEEE International Workshop on Software Certification Co-located with the ISSRE 2020 full-virtual conference 12-15 October 2020. Accepted peer-reviewed papers will be still included in a supplemental volume of the ISSRE conference proceedings, published by the IEEE Computer Society on IEEE Xplore.
Presentation
Full-text available
Sponsored by : Baba Farid College, India-IEEE Computer Society Canada- MSEST-NIELIT-SIRG
Article
Full-text available
O movimento de pesquisadores de Educação em Computação no Brasil vem promovendo vários espaços de diálogo dentro da Sociedade Brasileira de Computação com diversas áreas da Computação. Uma destas áreas é a Informática na Educação, com a qual estabelece convergências de pesquisa promissoras. Este artigo busca tecer considerações iniciais sobre as co...
Article
Full-text available
Professional computer ethics has widened its scope over the last 20 years as a direct result of the massive growth in computer mediated services by government and industry, and concerns over how data and interaction processes are recorded. These shifts are explored in conjunction with the parallel decline in community trust of government. The growi...
Article
Full-text available
Professional computer ethics has widened its scope over the last 20 years as a direct result of the massive growth in computer mediated services by government and industry, and concerns over how data and interaction processes are recorded. These shifts are explored in conjunction with the parallel decline in community trust of government. The growi...
Article
Full-text available
The aim of this work is to develop a new design concept for museum space using modern exhibition technologies. The new design concept of the museum space will increase the interest of visitors to museums. For the development of criteria were compiled, a classification of modern museum spaces. The expositional premises of the museum are modeled, a c...
Article
Full-text available
This note is concerned with an extension, at second order, of an inequality on the discrete cube \(C_n=\{-\,1,1\}^n\) (equipped with the uniform measure) due to Talagrand (Ann Probab 22:1576–1587, 1994). As an application, the main result of this note is a theorem in the spirit of a famous result from Kahn et al. (cf. Proceedings of 29th Annual Sym...
Article
Full-text available
Visual short-term tracking in a long sequence of images with a lot of pose variations, target deformations and different types of occlusion is one of the harshest tasks in image processing. Overcoming such challenges can be performed in a superior way by combining different trackers. In this paper, we propose a method that combines different algori...
Research Proposal
Full-text available
***** Call For Papers ***** 2020 International Conference on Blockchain and Trustworthy Systems (BlockSys'2020) --------------------------------------------------------- Aug. 6 - 7, 2020, Dali City, China http://blocksys.info/ --------------------------------------------------------- --------------------------------------------------------- Not...
Thesis
Full-text available
Since Papert generated the term, Computational Thinking (CT), many scholars devoted their effort in finding its nature. After Jeannette Wing's influential argument, it had been catching more researchers, educators, and policymakers' attention and been recognized as one of the important skills in this increasingly computing society. However, because...
Conference Paper
Full-text available
Smart transportation systems have been providing more data over time (such as bus routes, users, smartphones, etc.). Such data provides a number of opportunities to identify various facets of user behavior and traffic trends. In this paper we address some of the urban mobility challenges (already discussed by the Brazilian Computer Society), from a...
Article
Full-text available
Information and communication technology (ICT) have evolved in today's computing society whose waste causes environmental impacts and compromises sustainability. The objective of this research was to investigate the evolution of communication and information technology about it, and the environmental impacts this has caused on environmental sustain...
Book
Full-text available
This Festschrift, Unimagined Futures – ICT Opportunities and Challenges, examines key challenges facing the ICT community today. While addressing the contemporary challenges, the book provides the opportunity to look back to help understand the contemporary scene and identify appropriate future responses to them. Experts in different areas of the I...
Article
Full-text available
Pada penelitian ini, dilakukan klasifikasi dokumen Tugas Akhir di Teknik Informatika UMM. Permasalahan yang dihadapi adalah sulitnya untuk mencari informasi yang relevan dan sulitnya melakukan pengkategorian dokumen TA sesuai bidang minat jika harus dilakukan secara manual. Tujuan penelitian ini adalah mendapatkan informasi berdasarkan abstrak TA s...
Presentation
Full-text available
The Presentation was done at the National Regional Convention 2019 organized by the Computer Society of India, Lucknow Chapter.
Presentation
Full-text available
Here are the predictions for the Top 12 Tech Trends in 2020. The IEEE Computer Society has been predicting technology trends since 2015, and its annual forecast garners widespread attention for its authoritativeness. At the end of each year, the society also grades itself on its annual predictions with a scorecard, or report card, and they attract...
Article
Full-text available
Interactive image segmentation has been an active research topic in image processing and computer graphics. One of its appealing advantage is the optimization of human feedback and interactions to generate user-desired results. Segmentation results of most previous methods usually depend on the quality and quantity of the user input. In this paper,...
Article
Full-text available
DAMSS-2019 is the 11th international workshop on data analysis methods for software systems, organized in Druskininkai, Lithuania, at the end of the year. The same place and the same time every year. History of the workshop starts from 2009 with 16 presentations. The idea of such workshop came up at the Institute of Mathematics and Informatics that...
Poster
Full-text available
Blockchain is gradually becoming the mainstream technology for next-generation smart applications. It has the potential to ensure inclusive participation of various stakeholders to develop innovative solutions for collective and larger benefits for social good. In addition, the execution of unique decentralized business models on blockchain will en...
Article
Full-text available
ICT and the increasing availability of digital data are dramatically changing the processes of research and knowledge production in the social sciences and humanities (SSH). Whereas the methodological momentum in digital humanities and computational social sciences is already immense, theory development in the SSH is much less dynamic and consists...
Article
Full-text available
Cloud computing is amongst the leading and most promising set of IT services in the current era. There is no doubt that it has taken the computer society by a storm in recent years. What is so apparent with this system is the tremendous efforts made to ensure the computing resources come as a service. Cloud computing as a platform has an enormous p...
Conference Paper
Full-text available
Western Canon is a set of books, movies, music and art which holds the essence of western culture, it contains the common sense of western people. The western canon of software engineering is a set of artworks (books, papers, blogs, projects) which holds the essence of software engineering. The canon is not fixed, it changes time to time because sc...
Conference Paper
Full-text available
Balancing theory and practice is a recurring challenge in Software Engineering (SE) education. However, the curriculum guidelines of the ACM/IEEE and Brazilian Computer Society emphasize the need of providing students with sufficient practical experiences for the development of competences expected for SE professional. Student-centered and learn-by...
Preprint
Full-text available
Abstract Context: Mapping and analyzing the diversity of experiences and studies that address CT&P in K-12 education can bring valuable data to researchers. This work delimits such study to the Brazilian scenario to allow a more in-depth view. Previous surveys and systematic mapping studies present recent publications in major Brazilian computing j...
Article
Full-text available
Analysis of image contents became one of the important subjects in modern life. In order to recognize the images with efficient way, several techniques appeared and periodically enhanced by the developers. Image retrieval becomes one of the main problems that face the computer society inside the revolution of technology. To increase the effectivene...
Article
Full-text available
Analysis of image contents has become one of the important subjects in modern life. In order to recognize the images with efficient way, several techniques have appeared and periodically enhanced by the developers. Image retrieval becomes one of the main problems that face the computer society inside the revolution of technology. To increase the ef...
Article
Full-text available
Place/transition Petri nets are a standard model for a class of distributed systems whose reachability spaces might be infinite. One of well-studied topics is verification of safety and liveness properties in this model; despite an extensive research effort, some basic problems remain open, which is exemplified by the complexity status of the reach...
Article
The purpose of this study was to identify the common emerging ICT technologies and issues and challenges facing the smooth implementation of those technologies. The study addressed the following objectives; Identify Possible Solutions that Can Ease the Implementation of Emerging Technologies in Kenya. The study was self-administered and the populat...
Book
Full-text available
Welcome to London and to London Metropolitan University, a public research university with roots going back to 1848, it is one of the London’s oldest educational institutions. We have the pleasure to introduce the proceedings of the second International Conference on Computing, Electronics and Communications Engineering 2019 (iCCECE ’19), held fro...
Article
Full-text available
Big Data Analytics: principles, trends and tasks (a survey) Olexandr S. Balabanov Abstract We review current directions (avenues) in Big Data analysis, practical meaning of Big Data analysis and problems and tasks in this field. Big Data Analytics now appears a dominant trend of developments of modern information technologies for management in...
Conference Paper
Full-text available
This document is an extended abstract of an IEEE Software paper, "Metamorphic Testing: Testing the Untestable," presented as a J1C2 (Journal publication first, Conference presentation following) at the IEEE Computer Society signature conference on Computers, Software and Applications (COMPSAC 2019), hosted by Marquette University, Milwaukee, Wiscon...
Preprint
Full-text available
For standard algorithms verifying positive definiteness of a matrix $A\in\mathbb{M}_n(\mathbb{R})$ based on Sylvester's criterion, the computationally pessimistic case is this when $A$ is positive definite. We present two algorithms realizing the same task for $A\in\mathbb{M}_n(\mathbb{Z})$, for which the case when $A$ is positive definite is the o...