Science topic

Programming Languages - Science topic

Java, C, C++, C#...
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Programming Languages (10,000)
Sorted by most recent
Article
Full-text available
We execute the quantum eraser, the Elitzur–Vaidman bomb, and the Hardy’s paradox experiment using high-level programming language on a generic, gate-based superconducting quantum processor made publicly available by IBM. The quantum circuits for these experiments use a mixture of one-qubit and multi-qubit gates and require high entanglement gate ac...
Article
Full-text available
Objective Data clustering is a common exploration step in the omics era, notably in genomics and proteomics where many genes or proteins can be quantified from one or more experiments. Bayesian clustering is a powerful unsupervised algorithm that can classify several thousands of genes or proteins. AutoClass C, its original implementation, handles...
Article
Full-text available
In recent years, recommendation systems have become more complex with increasing research on user preferences. Recommendation algorithm based on deep learning has attracted a lot of attention from researchers in academia and industry, and many new algorithm models are proposed every year. Researchers often need to implement the proposed model to co...
Article
Full-text available
To enable large-scale application of polygenic risk scores (PRSs) in a computationally efficient manner, we translate a widely used PRS construction method, PRS–continuous shrinkage, to the Julia programming language, PRS.jl. On nine different traits with varying genetic architectures, we demonstrate that PRS.jl maintains accuracy of prediction whi...
Article
Full-text available
Some test amplification tools extend a manually created test suite with additional test cases to increase the code coverage. The technique is effective, in the sense that it suggests strong and understandable test cases, generally adopted by software engineers. Unfortunately, the current state-of-the-art for test amplification heavily relies on pro...
Presentation
Full-text available
Context-aware systems are systems that adapt their behavior dynamically when sensing changes in the surrounding environment in which they run. These changes may come from changing user preferences, external sensors (weather, localisation), or internal sensors (battery, memory) of the device. The paradigm of context-oriented programming, provides de...
Article
Full-text available
Modern programming languages such as Java, JavaScript, and Rust encourage software reuse by hosting diverse and fast-growing repositories of highly interdependent packages (i.e., reusable libraries) for their users. The standard way to study the interdependence between software packages is to infer a package dependency network by parsing manifest d...
Article
Full-text available
Multi-language systems became prevalent with technological advances. Developers opt for the combination of programming languages to build a single application. Such combinations of programming languages allow the reuse of existing code and libraries without re-implementing the code from scratch. Software quality is achieved by following good softwa...
Article
Full-text available
Due to the heterogeneity of program language and natural language query, it is difficult to identify the semantic relationship between them, which leads to the low efficiency of code recommendation. In order to solve the problems of the above code recommendation technology, a code recommendation method based on joint embedded attention network (JEA...
Article
Full-text available
As a kind of building material, decorative ceramic tiles boast unique functional advantages and artistic aesthetics. However, they face problems such as inflexible laying methods and highly homogenized motifs. In the digital era, computer technology has become an indispensable tool in modern innovation. This experiment uses JavaScript as the progra...
Article
Full-text available
For statistical quality assurance based on the inspection of a random sample, acceptance sampling plan help to decide whether the lot should be accepted or rejected. Most traditional plans only focus on minimizing the consumer’s risk, but producer’s risk also should not be ignored in acceptance sampling plan. Therefore, this study focuses on reduci...
Conference Paper
Full-text available
Many platforms are emerging recently and businesses need to work with all of them, therefore, creating applications that work on multiplatform like Android, IOS, Windows …etc. is necessary these days. Building a separate native application for each platform as well as working separately with both Frontend and Backend is costly in several respects,...
Conference Paper
Full-text available
Deep Learning is a part of machine learning and is based on artificial neural networks in which multiple layers of processing are used and progressively higher-level features are extracted from given data. Deep learning methods for image identification can now extract the number, pixel location, scale, and other features of an image from a database...
Article
Full-text available
Background With the growing impact of observational research studies, there is also a growing focus on data quality (DQ). As opposed to experimental study designs, observational research studies are performed using data mostly collected in a non-research context (secondary use). Depending on the number of data elements to be analyzed, DQ reports of...
Article
Full-text available
We use the functional programming language Haskell to design semantic interpreters for the spiking neural P systems. Haskell provides an appropriate support for implementing the denotational semantics of a concurrent language inspired by the spiking neural P systems. This language and its semantics describe properly the structure and behaviour of t...
Article
Full-text available
This paper shows that generic types ( generics ) are useful for writing more abstract and more general smart contracts, but this comes with some security risks, reporting a concrete security issue found while using generics for writing smart contracts that implement shared entities for the Hotmoka blockchain. That issue can be used to steal the rem...
Preprint
Full-text available
Introduction. Until now, the impact of learning variables on consumers' choices concerning Chinese product brands in the international online shopping framework remains unknown. Accordingly, this study aims to examine the effect of those learning variables on global consumers' choices of Chinese product brands. Method. A total of 44,704 transaction...
Preprint
Full-text available
We show that the spectral theorem -- which we understand to be a statement that every self-adjoint matrix admits a certain type of canonical form under unitary similarity -- admits analogues over other $*$-algebras distinct from the complex numbers. If these $*$-algebras contain nilpotents, then it is shown that there is a consistent way in which m...
Article
Full-text available
English characters are foremost wide adopted writing systems within the world. Previous analysis had main focus on recognizing handwritten English numbers but to teach a machine recognition of English characters is a challenge and a fascinating task. This paper aims to review existing strategies for the handwritten character recognition using machi...
Preprint
Full-text available
Early in the pandemic, we -- leaders in the research areas of programming languages (PL) and computer architecture (CA) -- realized that we had a problem: the only way to form new lasting connections in the community was to already have lasting connections in the community. Both of our academic communities had wonderful short-term mentoring program...
Article
Full-text available
This paper presents the automatic document reader for visually impaired people, developed on Raspberry Pi. It uses the Optical character recognition technology for the identification of the printed characters using image sensing devices and computer programming. It converts images of typed, handwritten, or printed text into machine encoded text. In...
Article
Full-text available
In accordance with the new recovery plan, Next Generation EU (NGEU), and the need to speed up the transition of cities towards a new sustainable model, this paper provides an overview of the outcomes of the PEDRERA project, which is focused on the development of a novel tool able to calculate multiple key performance indicators that can support ren...
Conference Paper
Full-text available
Reflecting the principled design of programming languages for the express purposes of being understandability and useful, the Boxer programming language rested on dual principles of spatial metaphor and naive realism, as well as a broader principle of "reconstructability." These principles are over 35 years old and the language itself is mostly a m...
Preprint
Full-text available
Answer Set Programming (ASP), a modern development of Logic Programming, enables a natural integration of Computing with STEM subjects. This integration addresses a widely acknowledged challenge in K-12 education, and early empirical results on ASP-based integration are promising. Although ASP is considered a simple language when compared with impe...
Preprint
Full-text available
We considers how a particular kind of graph corresponds to multiplicative intuitionistic linear logic formula. The main feature of the graphical notation is that it absorbs certain symmetries between conjunction and implication. We look at the basic definitions and present details of an implementation in the functional programming language Standard...
Article
Full-text available
Technology is gradually taking over every aspect of human endeavor and many organizations or institutions are following the trend in their services or operations. Therefore, library which is seen as the gateway of knowledge should not be left out. There is no doubt that open source technology is now an emerging technological trend that drives succe...
Article
Full-text available
This paper discusses the implementation of REVISION, a GUI-enabled security and surveillance system that detects motion in video streams received from attached webcams in real time. REVISION has the ability to automatically analyze the video images, alert and archive the images when motion is detected from the view of the camera. This provides reli...
Conference Paper
Full-text available
In this study, with the help of image processing, which is the most important input for the robotic system, the location of the dill on the soil according to the harvest size was determined.According to the space coordinate system, the x (horizontal) and y (vertical) coordinates of the dill were found on a pixel basis in the digital environment.Ima...
Article
Full-text available
There are more and more tunnel projects in the karst-developed areas in Southwest China. Affected by karst caves and water, karst tunnels often experience geological disasters such as local collapses and water inrush. A simplified rock stress hardening-softening model was established based on the triaxial compression test results of two kinds of ca...
Article
Full-text available
Conservation management for a species generally rests on intraspecific units, while identification of their geographic boundaries is necessary for the implementation. Intraspecific units can be discriminated using population genetic methods, yet an analytical approach is still lacking for detecting their geographic boundaries. Here, based on landsc...
Preprint
Full-text available
Since the advent of the OBORI, it was subjected to numerous studies. However, most 15 previous studies investigated only the potential impact of the OBORI on the Chinese economy and 16 geopolitics. Therefore, its real effect on Chinese international commerce in OBORI countries is not 17 evaluated yet. Accordingly, this study intends to model the OB...
Article
Full-text available
In modern operating systems and programming languages adapted to multicore computer architectures, parallelism is abstracted by the notion of execution threads. Multi-threaded systems have two major specificities: on the one part, new threads can be created dynamically at runtime, so there is no bound on the number of threads participating in long-...
Article
Full-text available
Background Learning to code is increasingly embedded in secondary and higher education curricula, where solving programming exercises plays an important role in the learning process and in formative and summative assessment. Unfortunately, students admit that copying code from each other is a common practice and teachers indicate they rarely use pl...
Preprint
Full-text available
In this paper, we present a framework for moving compute and data between processing elements in a distributed heterogeneous system. The implementation of the framework is based on the LLVM compiler toolchain combined with the UCX communication framework. The framework can generate binary machine code or LLVM bitcode for multiple CPU architectures...
Preprint
Full-text available
Learning the new Free Form programming language for cloud programming of Unity games.
Article
Full-text available
The Erlang programming language is used to build concurrent, distributed, scalable and resilient systems. Every component of these systems has to be thoroughly tested not only for correctness, but also for performance. Performance analysis tools in the Erlang ecosystem, however, do not provide a sufficient level of automation and insight needed to...
Article
Full-text available
The field of computational thinking (CT) is developing rapidly, reflecting its importance in the global economy. However, most empirical studies have targeted CT in K-12, thus, little attention has been paid to CT in higher education. The present scoping review identifies and summarizes existing empirical studies on CT assessments in post-secondary...
Article
Full-text available
Background The development of students' digital skills is essential to access the labour market and interact with society, being especially important in disadvantaged socioeconomic contexts affected by the digital divide. Objectives The investigation has two objectives. On the one hand, to study the integration of ICT in disadvantaged contexts and...
Article
Full-text available
Most of the residents of Sumbawa Regency live in rural areas with a livelihood as farmers. In agriculture, of course, farmers need the availability of fertilizers and agricultural medicines. Fertilizers and agricultural drugs have many benefits for farmers, one of which is to stimulate plant growth and to prevent pests on plants. This is done to in...
Article
Full-text available
In today’s world, almost every domain has certain and mandatory requirements to understand at least one of the programming languages which is defined as a way of interaction with a computer to resolve real world problems or more specifically for the implementation of algorithms. Language programming is a course with strong theory and practice. In v...
Article
Full-text available
Developers, programmers and coders usually know two or three programming languages to get the most probability finding solutions of their obligated tasks in business. In addition, trainers who study a language and find another one is interested so, he need just the different or the new statement of the new language. All of the previous persons alre...
Preprint
Full-text available
At Sandia National Laboratories, QSCOUT (the Quantum Scientific Computing Open User Testbed) is an ion-trap based quantum computer built for the purpose of allowing users low-level access to quantum hardware. Commands are executed on the hardware using Jaqal (Just Another Quantum Assembly Language), a programming language designed in-house to suppo...
Preprint
Full-text available
Decentralized services and applications provide a multitude of advantages for their users, such as improved privacy, control, and independence from third parties. Anyhow, decentralization comes at the cost of certain disadvantages, such as increased application complexity or communication overhead. This aggravates the development and deployment of...
Thesis
Full-text available
This mixed methods study examined practitioners' experiences with mandatory portfolio-based language assessment (PBLA) as implemented in government-funded language programs for adult newcomers to Canada. Participants' reports on PBLA impact on language teaching and learning were collected in two phases through online surveys (N1 = 323; N2 = 94) fro...
Preprint
Full-text available
Decentralized services and applications provide a multitude of advantages for their users, such as improved privacy, control, and independence from third parties. Anyhow, decentralization comes at the cost of certain disadvantages, such as increased application complexity or communication overhead. This aggravates the development and deployment of...
Article
Full-text available
Hostel management system is an advanced system that makes organizing the affairs of the hostel quicker, simpler, and more efficient. The normal procedure of allocating hostels at Babcock University involves selecting the preferred hostel online via the UMIS (University management information system) portal while the procedure for selecting rooms in...
Article
Full-text available
Effective management planning tools for forest require growth and yield functions that can produce detailed predictions of stand development. The Gamma distribution function (GDF), which is one of growth function is evolving, but there is dearth of information on its use on forest management in Nigeria. This Study aimed at developing an automated s...
Preprint
Full-text available
The market share of mobility on-demand (MoD) services strongly increased in recent years and is expected to rise even higher once vehicle automation is fully available. These services might reduce space consumption in cities as fewer parking spaces are required if private vehicle trips are replaced. If rides are shared additionally, occupancy relat...
Article
Full-text available
Agriculture in developing countries faces numerous challenges such as price fluctuation and non-uniformity, presence of untrusted middlemen in the supply chain, crop wastage due to inadequate storage facilities or long commutes, and lack of proper monitoring. Blockchain technology has emerged as a promising approach to solve these challenges. Even...
Conference Paper
Full-text available
Bloom, Fokkink & van Glabbeek (2004) presented a method to decompose formulas from Hennessy-Milner logic with regard to a structural operational semantics specification. A term in the corresponding process algebra satisfies a Hennessy-Milner formula if and only if its subterms satisfy certain formulas, obtained by decomposing the original formula....
Article
Full-text available
SQL is the world’s most popular declarative language, forming the basis of the multi-billion-dollar database industry. Although SQL has been standardized, the full standard is based on ambiguous natural language rather than formal specification. Commercial SQL implementations interpret the standard in different ways, so that, given the same input d...
Preprint
Full-text available
Students with Autism Spectrum Disorder (ASD) frequently experience barriers to learning in computer science. This can be especially true in programming due to its abstract concepts. It is important that teachers of computer science are aware of how to support students with ASD as the national curriculum requires all students in KS3 to have experien...
Preprint
Full-text available
This paper presents DeCon, a declarative programming language for implementing smart contracts and specifying contract-level properties. Driven by the observation that smart contract operations and contract-level properties can be naturally expressed as relational constraints, DeCon models each smart contract as a set of relational tables that stor...
Article
Full-text available
Resource management efficiency can be a beneficial step toward optimizing power consumption in software-hardware integrated systems. Languages such as C, C++, and Fortran have been extremely popular for dealing with optimization, memory management, and other resource management. We investigate novel algorithmic architectures capable of optimizing r...
Conference Paper
Full-text available
Today, manual investments in exchanges such as crypto, spot, futures and forex are quickly replaced by algorithmic transactions. Algorithmic transactions automatically send electronic buy/sell commands from the investor's portfolio to the financial stock market when conditions occur, depending on previously developed algorithms. These algorithmic t...
Article
Full-text available
One of the technological developments in the modern era is computers as a substitute for human labor. The development of advanced technology must also be applied with the right application. In this study, we will explain the creation of web-based inventory software. Software development method using the Prototype method, the programming language us...
Article
Full-text available
Software-defined networking (SDN) is an innovative network architecture that splits the control and management planes from the data plane. It helps in simplifying network manageability and programmability, along with several other benefits. Due to the programmability features, SDN is gaining popularity in both academia and industry. However, this e...
Article
Full-text available
Diffraction enhanced imaging (DEI) is an advanced digital radiographic imaging technique employing the refraction of X-rays to contrast internal interfaces. This study aims to qualitatively and quantitatively evaluate images acquired using this technique and to assess how different fitting functions to the typical rocking curves (RCs) influence the...
Article
Full-text available
Recent information technologies such as virtual reality (VR) and augmented reality (AR) allow the creation of simulated sensory worlds with which we can interact. Using programming language, digital details can be overlaid onto displays of our environment, confounding what is real and what has been artificially engineered. Natural language, particu...
Article
Full-text available
Information Technology (IT) has contributed to the development of many areas, including the development of companies and in accordance with the requirements of the free market, so it has become necessary to contribute to the development of the knowledge management system because of its importance in the use and dissemination of knowledge through th...
Preprint
Full-text available
The structural identifiability and the observability of a model determine the possibility of inferring its parameters and states by observing its outputs. These properties should be analysed before attempting to calibrate a model. Unfortunately, such \textit{a priori} analysis can be challenging, since it requires symbolic calculations that often h...
Article
Full-text available
Measurements can be done with classical terrestrial techniques in geodetic deformation networks, as well as by using Global Navigation Satellite System (GNSS) technique, which is one of the most widely used modern techniques today. GNSS is a high-accuracy technique that is widely used today for monitoring and detecting deformations in the earth’s c...
Preprint
Full-text available
To enable robots to achieve high level objectives, engineers typically write scripts that apply existing specialized skills, such as navigation, object detection and manipulation to achieve these goals. Writing good scripts is challenging since they must intelligently balance the inherent stochasticity of a physical robot's actions and sensors, and...