17,695 results on '"Computer science"'
Search Results
2. The Race to Decode an Ancient Scroll.
- Author
-
WEBER, TOMAS
- Subjects
- *
SYNCHROTRONS , *ENGINEERS , *MILITARY engineering , *COMPUTER science - Abstract
This article explores the efforts of scientists, students, gamers, and professionals in Silicon Valley to decode ancient scrolls from Herculaneum, a Roman town destroyed by Mount Vesuvius in 79 C.E. The scrolls, which were preserved but carbonized, have proven difficult to decipher without causing damage. However, the use of artificial intelligence and machine learning has shown promise in virtually unwrapping the scrolls and detecting ink. A competition called the Vesuvius Challenge has been organized to encourage collaboration in decoding the scrolls, with a prize of over $1 million. Advanced imaging technologies and machine learning algorithms are being used to reveal previously unreadable text on hundreds of papyrus scrolls, potentially revolutionizing the fields of papyrology and classics. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
3. Weak second-order quantum state diffusion unraveling of the Lindblad master equation.
- Author
-
Adhikari, Sayak and Baer, Roi
- Subjects
- *
QUANTUM optics , *WAVE functions , *NONLINEAR equations , *COMPUTER science , *EQUATIONS , *APPLICATION software , *QUANTUM states - Abstract
Simulating mixed-state evolution in open quantum systems is crucial for various chemical physics, quantum optics, and computer science applications. These simulations typically follow the Lindblad master equation dynamics. An alternative approach known as quantum state diffusion unraveling is based on the trajectories of pure states generated by random wave functions, which evolve according to a nonlinear Itô–Schrödinger equation (ISE). This study introduces weak first-order and second-order solvers for the ISE based on directly applying the Itô–Taylor expansion with exact derivatives in the interaction picture. We tested the method on free and driven Morse oscillators coupled to a thermal environment and found that both orders allowed practical estimation with a few dozen iterations. The variance was relatively small compared to the linear unraveling and did not grow with time. The second-order solver delivers a much higher accuracy and stability with bigger time steps than the first-order scheme, with a small additional workload. However, the second-order algorithm has quadratic complexity with the number of Lindblad operators as opposed to the linear complexity of the first-order algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Community Is Critical Too.
- Author
-
Clegg, Tamara L.
- Subjects
- *
STEM education , *BLACK women , *COMPUTER science , *COMMUNITIES , *COMMUNITY support - Abstract
This article reflects on the author’s experiences as a black woman in the field of computing science. Topics include her educational experience in computing science, her personal communities’ support of her throughout her education, and how her experiences lead to her Science Everywhere project which encourages learners to think about STEM in all aspects of their daily lives.
- Published
- 2024
- Full Text
- View/download PDF
5. Almost-Linear-Time Algorithms for Maximum Flow and Minimum-Cost Flow.
- Author
-
Li Chen, Kyng, Rasmus, Liu, Yang P., Peng, Richard, Gutenberg, Maximilian Probst, and Sachdeva, Sushant
- Subjects
- *
ALGORITHMS , *COMPUTER science , *INTERIOR-point methods , *LINEAR time invariant systems , *MATHEMATICS theorems - Abstract
The article discusses an algorithm designed to compute maximum flow and minimum-cost flows. It builds on the works of prior researchers to propose new theorems and provides formulas and graphs to illustrate these theorems and schemes.
- Published
- 2023
- Full Text
- View/download PDF
6. Theoretical Analysis of Edit Distance Algorithms: To what extent have the techniques for theoretical analysis of edit distance algorithms achieved their goals?
- Author
-
MEDVEDEV, PAUL
- Subjects
- *
ALGORITHMS , *COMPUTER science - Abstract
The article provides a theoretical analysis of edit distance algorithms. It surveys the varying approaches in analyzing edit distance algorithms. It concludes that the implementation and validation or edit distance algorithms should be part of the same process rather than treated as individual processes. It advocates for a mulit-disciplinary team that can merge the theoretical and practical aspect of this discipline.
- Published
- 2023
- Full Text
- View/download PDF
7. Data Analytics Anywhere and Everywhere: Mobile, ubiquitous, and immersive computing appear poised to transform visualization, data science, and data-driven decision making.
- Author
-
ELMQVIST, NIKLAS
- Subjects
- *
UBIQUITOUS computing , *MOBILE computing , *DATA analysis , *DATA science , *DATA visualization , *COMPUTER science , *DATA , *ELECTRONIC records - Abstract
The article examines the rise of ubiquitous computing. Describes the proliferation of smart phones, mobile computing devices and immersive technologies that produce "anywhere and everywhere data" and how such devices are becoming increasing entwined. Describes the local, temporal and contextual nature of generated data. Applies the post-cognitive framework from social science to information science in order to describe how information is transformed through interactions between media sources. Discusses how the various devices should complement each other as ubiquitous analytics works to leverage the shared data.
- Published
- 2023
- Full Text
- View/download PDF
8. There Was No 'First AI Winter': Despite challenges and failures, the artificial intelligence community grew steadily during the 1970s.
- Author
-
Haigh, Thomas
- Subjects
- *
ARTIFICIAL intelligence research , *SCIENTIFIC community , *RESEARCH funding , *NINETEEN seventies , *COMPUTER science - Abstract
The article discusses the community that developed during the decade of the 1970's that fostered the growth of research into artificial intelligence. It details the slow progress of AI researchers in developing the field. It mentions the importance of military backing in aid of AI research, including funding acquired through Advanced Research Projects Agency (ARPA) to places like MIT and Stanford University. It outlines the continued struggle for broader funding. It describes the growth of AI organizations, increased conference attendance, class enrollment in universities, and the growing number of published articles throughout the 1970's as evidence of the growing support for this field in the academic and computer science communities.
- Published
- 2023
- Full Text
- View/download PDF
9. Informatics Higher Education in Europe: A Data Portal and Case Study.
- Author
-
DI NITTO, ELISABETTA, GARCÍA-VAREA, ISMAEL, JAZAYERI, MEHDI, TAMBURRI, DAMIAN A., and TIKHONENKO, SVETLANA
- Subjects
- *
COMPUTER science , *HIGHER education , *DATABASES , *WEB portals , *APPLIED sciences , *RESEARCH universities & colleges - Abstract
This article investigates the current state of informatics higher education in Europe by utilizing the Informatics Europe Higher Education (IEHE) data portal. First, the article provides a detailed look at the IEHE data portal. Then the article provides a case study comparing informatics higher education at applied sciences universities compared to traditional research universities in five selected European countries using data providing in the portal.
- Published
- 2023
- Full Text
- View/download PDF
10. Autocorrect Is Not: People Are Multilingual and Computer Science Should Be Too.
- Author
-
Hoadley, Christopher and Vogel, Sara
- Subjects
- *
COMPUTER science , *MULTILINGUALISM , *COMPUTER programming , *LANGUAGE awareness - Abstract
Considering the interconnection of computing and human languages. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Undergraduate Computer Science Curricula.
- Author
-
Simha, Rahul, Kumar, Amruth N., and Raj, Rajendra K.
- Subjects
- *
COMPUTER science , *CURRICULUM planning , *CURRICULUM , *EMPLOYABILITY , *PREPAREDNESS , *SUCCESS - Abstract
First-job readiness versus long-term career preparation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Philosophy of computer science on prediction of human liver disease with comparative analysis methods on machine learning.
- Author
-
Ginting, Dewi Sartika Br, Zarlis, Muhammad, and Nasution, Zulkifli
- Subjects
- *
PHILOSOPHY of science , *COMPUTER science , *LIVER diseases , *COMPARATIVE method , *ANTHROPOSOPHY , *MACHINE learning - Abstract
Liver disorders in humans do not see age, all age groups from young to old can be affected by liver disorders. Liver disorders can be medically broken down into 3 more specific types, namely hepatitis C, fibrosis and cirrhosis. Hepatitis C is generally caused by a virus, fibrosis is caused by genetic factors and cirrhosis is caused by the emergence of tissue in the liver. To make a specific diagnosis of this type of liver disorder, it is necessary to conduct research related to prediction of human liver function disorders using machine learning methods. There are many machine learning methods, and on this occasion the researcher is also trying to find the philosophy of computer science from this research which will look for evidence of the truth of the performance of each machine learning method that makes predictions in this study. The end result is axiological philosophy of science from the analysis of the truth of the performance of this study which states that the performance of the neural network has a greater accuracy of 94.4% and is followed by other methods such as nave Bayes 81.3%, kNN 93.6%, and SVM 94.1%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. International journal of information security: a bibliometric study, 2007–2023.
- Author
-
Dwivedi, Rahul
- Subjects
- *
BIBLIOMETRICS , *INTERNET security , *COMPUTER science , *SECURITY systems , *REGRESSION analysis , *COMPUTER network security - Abstract
This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. "Lecture Notes on Computer Science" is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web & Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. The Ring: Worst-case Optimal Joins in Graph Databases using (Almost) No Extra Space.
- Author
-
Arroyuelo, Diego, Gómez-Brandón, Adrián, Hogan, Aidan, Navarro, Gonzalo, Reutter, Juan, Rojas-Ledesma, Javiel, and Soto, Adrián
- Subjects
- *
DIRECTED graphs , *GRAPH algorithms , *RELATIONAL databases , *TIME complexity , *COMPUTER science , *DATA structures , *DATA security failures - Published
- 2024
- Full Text
- View/download PDF
15. Perspectives on Professional Development Among University and Community Pediatric Hospitalists.
- Author
-
Sun, Vivien K., Chappell-Campbell, Laura, Blankenburg, Rebecca, and Sznewajs, Aimee
- Subjects
- *
HEALTH services administration , *PEDIATRICIANS , *QUALITATIVE research , *ACADEMIC medical centers , *FOCUS groups , *MEDICAL education , *SENSORY perception , *EXCELLENCE , *HOSPITALISTS , *CHILDREN'S hospitals , *HOSPITALS , *MENTORING , *PATIENT advocacy , *COMPUTER science , *PEDIATRICS , *JOB satisfaction , *WORLD health , *PROFESSIONAL employee training , *CONCEPTUAL structures , *ABILITY , *INFORMATION science , *INDIVIDUAL development , *QUALITY assurance , *PSYCHOSOCIAL factors , *TRAINING , *PROFESSIONAL competence , *VOCATIONAL guidance - Abstract
Multiple professional societies have emphasized the importance of professional development for physicians. This qualitative study aimed to explore pediatric hospitalists' perceptions of professional development needs and to refine a framework for professional development in pediatric hospital medicine (PHM). We conducted four focus groups in April to May 2019 with 19 pediatric hospitalists at six clinical sites within a single institution. Participants identified key components of professional development including skill development, personal growth, career satisfaction, and individualization. Hospitalists agreed upon 8 domains of professional development: clinical excellence, advocacy, global health, health care administration, informatics, medical education, quality improvement, and research. They also identified missing the mentorship necessary to change their passions into career advancement, highlighted barriers and facilitators, and noted that an alignment in personally meaningful projects to what is meaningful to the institution was in everyone's best interests. Faculty programs should build infrastructure to aid pediatric hospitalists in achieving their career goals. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Coding choreography: Understanding student responses to representational incompatibilities between dance and programming.
- Author
-
Steinberg, Selena, Gresalfi, Melissa, Vogelstein, Lauren, and Brady, Corey
- Subjects
- *
STUDENT engagement , *CHOREOGRAPHY , *COMPUTER programming , *STUDENT activism - Abstract
This paper considers how a curricular design that integrated computer programming and creative movement shaped students' engagement with computing. We draw on data from a camp for middle schoolers, focusing on an activity in which students used the programming environment NetLogo to re-represent their physical choreography. We analyze the extent to which students noticed incompatibilities (mismatches between possibilities in dance and NetLogo), and how encountering them shaped their coding. Our findings suggest that as students attended to incompatibilities, they experienced struggle, but persisted and engaged in iterative cycles of design. Our work suggests that tensions between arts and programming may promote student engagement. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Transferring experiences in k-nearest neighbors based multiagent reinforcement learning: an application to traffic signal control.
- Author
-
Bazzan, Ana Lucia C., de Almeida, Vicente N., and Abdoos, Monireh
- Subjects
- *
TRAFFIC signs & signals , *REINFORCEMENT learning , *TRAFFIC engineering , *MACHINE learning , *K-nearest neighbor classification , *ARTIFICIAL intelligence , *COMPUTER science - Abstract
The increasing demand for mobility in our society poses various challenges to traffic engineering, computer science in general, and artificial intelligence in particular. Increasing the capacity of road networks is not always possible, thus a more efficient use of the available transportation infrastructure is required. Another issue is that many problems in traffic management and control are inherently decentralized and/or require adaptation to the traffic situation. Hence, there is a close relationship to multiagent reinforcement learning. However, using reinforcement learning poses the challenge that the state space is normally large and continuous, thus it is necessary to find appropriate schemes to deal with discretization of the state space. To address these issues, a multiagent system with agents learning independently via a learning algorithm was proposed, which is based on estimating Q-values from k-nearest neighbors. In the present paper, we extend this approach and include transfer of experiences among the agents, especially when an agent does not have a good set of k experiences. We deal with traffic signal control, running experiments on a traffic network in which we vary the traffic situation along time, and compare our approach to two baselines (one involving reinforcement learning and one based on fixed times). Our results show that the extended method pays off when an agent returns to an already experienced traffic situation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. An Approach to Distributed Systems from Orderings and Representability.
- Author
-
Estevan, Asier
- Subjects
- *
FAMILY communication , *LINEAR orderings , *COMPUTER science , *DECISION theory - Abstract
In the present paper, we propose a new approach on 'distributed systems': the processes are represented through total orders and the communications are characterized by means of biorders. The resulting distributed systems capture situations met in various fields (such as computer science, economics and decision theory). We investigate questions associated to the numerical representability of order structures, relating concepts of economics and computing to each other. The concept of 'quasi-finite partial orders' is introduced as a finite family of chains with a communication between them. The representability of this kind of structure is studied, achieving a construction method for a finite (continuous) Richter–Peleg multi-utility representation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. A lower bound on the third-order nonlinearity of the simplest [formula omitted] bent functions.
- Author
-
Li, Zhaole, Shen, Bing, and Tang, Deng
- Subjects
- *
BENT functions , *REED-Muller codes , *BOOLEAN functions , *CODING theory , *COMPUTER science - Abstract
Boolean functions used in symmetric-key encryption should have high higher-order nonlinearity to resist several known cryptographic attacks, such as algebraic attacks and low-degree approximation attacks. The higher-order nonlinearity also plays an important role in coding theory and theoretical computer science, since it relates to the covering radius of Reed–Muller codes and the Gowers norm, respectively. It is well-known that bent functions have the highest nonlinearity in an even number of variables and thus they possess the best ability to withstand fast correlation attacks and best affine approximation attacks. However, there is currently limited knowledge regarding the higher-order nonlinearity of bent functions because computing the higher-order nonlinearity, or even providing tight lower bounds, is an extremely hard task. In 1974, Dillon proposed two well-known classes of bent functions based on partial spread (in brief, PS), called PS − and PS + , respectively. He also exhibited a subclass of bent functions in PS − , known as partial spread affine plane(PS a p for short). In this paper, we provide a lower bound on the third-order nonlinearity of the simplest PS a p bent functions in n variables, where n ≥ 6 is even, by calculating the nonlinearities of all second-order derivatives of this kind of bent functions. Compared to the two known lower bounds on the third-order nonlinearity given by Carlet and Tang et al. respectively, our lower bound is much better than these two ones. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Scientometric Research and Critical Analysis of Gait and Balance in Older Adults.
- Author
-
Mao, Qian, Zheng, Wei, Shi, Menghan, and Yang, Fan
- Subjects
- *
OLDER people , *MOBILITY of older people , *CRITICAL analysis , *MEDICAL technology , *BIBLIOMETRICS , *COMPUTER science , *GAIT in humans - Abstract
Gait and balance have emerged as a critical area of research in health technology. Gait and balance studies have been affected by the researchers' slow follow-up of research advances due to the absence of visual inspection of the study literature across decades. This study uses advanced search methods to analyse the literature on gait and balance in older adults from 1993 to 2022 in the Web of Science (WoS) database to gain a better understanding of the current status and trends in the field for the first time. The study analysed 4484 academic publications including journal articles and conference proceedings on gait and balance in older adults. Bibliometric analysis methods were applied to examine the publication year, number of publications, discipline distribution, journal distribution, research institutions, application fields, test methods, analysis theories, and influencing factors in the field of gait and balance. The results indicate that the publication of relevant research documents has been steadily increasing from 1993 to 2022. The United States (US) exhibits the highest number of publications with 1742 articles. The keyword "elderly person" exhibits a strong citation burst strength of 18.04, indicating a significant focus on research related to the health of older adults. With a burst factor of 20.46, Harvard University has made impressive strides in the subject. The University of Pittsburgh displayed high research skills in the area of gait and balance with a burst factor of 7.7 and a publication count of 103. The research on gait and balance mainly focuses on physical performance evaluation approaches, and the primary study methods include experimental investigations, computational modelling, and observational studies. The field of gait and balance research is increasingly intertwined with computer science and artificial intelligence (AI), paving the way for intelligent monitoring of gait and balance in the elderly. Moving forward, the future of gait and balance research is anticipated to highlight the importance of multidisciplinary collaboration, intelligence-driven approaches, and advanced visualization techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. From Halley to Secant: Redefining root finding with memory-based methods including convergence and stability.
- Author
-
Qureshi, Sania, Soomro, Amanullah, Naseem, Amir, Gdawiec, Krzysztof, Argyros, Ioannis K., Alshaery, Aisha A., and Secer, Aydin
- Subjects
- *
HEMORHEOLOGY , *COMPUTER science , *ADIABATIC temperature , *NEWTON-Raphson method , *TAYLOR'S series - Abstract
Root-finding methods solve equations and identify unknowns in physics, engineering, and computer science. Memory-based root-seeking algorithms may look back to expedite convergence and enhance computational efficiency. Real-time systems, complicated simulations, and high-performance computing demand frequent, large-scale calculations. This article proposes two unique root-finding methods that increase the convergence order of the classical Newton-Raphson (NR) approach without increasing evaluation time. Taylor's expansion uses the classical Halley method to create two memory-based methods with an order of 2.4142 and an efficiency index of 1.5538. We designed a two-step memory-based method with the help of Secant and NR algorithms using a backward difference quotient. We demonstrate memory-based approaches' robustness and stability using visual analysis via polynomiography. Local and semilocal convergence are thoroughly examined. Finally, proposed memory-based approaches outperform several existing memory-based methods when applied to models including a thermistor, path traversed by an electron, sheet-pile wall, adiabatic flame temperature, and blood rheology nonlinear equation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Emerging opportunities of using large language models for translation between drug molecules and indications.
- Author
-
Oniani, David, Hilsman, Jordan, Zang, Chengxi, Wang, Junmei, Cai, Lianjin, Zawala, Jan, and Wang, Yanshan
- Subjects
- *
LANGUAGE models , *GENERATIVE artificial intelligence , *DRUG discovery , *MOLECULES , *EVIDENCE gaps - Abstract
A drug molecule is a substance that changes an organism's mental or physical state. Every approved drug has an indication, which refers to the therapeutic use of that drug for treating a particular medical condition. While the Large Language Model (LLM), a generative Artificial Intelligence (AI) technique, has recently demonstrated effectiveness in translating between molecules and their textual descriptions, there remains a gap in research regarding their application in facilitating the translation between drug molecules and indications (which describes the disease, condition or symptoms for which the drug is used), or vice versa. Addressing this challenge could greatly benefit the drug discovery process. The capability of generating a drug from a given indication would allow for the discovery of drugs targeting specific diseases or targets and ultimately provide patients with better treatments. In this paper, we first propose a new task, the translation between drug molecules and corresponding indications, and then test existing LLMs on this new task. Specifically, we consider nine variations of the T5 LLM and evaluate them on two public datasets obtained from ChEMBL and DrugBank. Our experiments show the early results of using LLMs for this task and provide a perspective on the state-of-the-art. We also emphasize the current limitations and discuss future work that has the potential to improve the performance on this task. The creation of molecules from indications, or vice versa, will allow for more efficient targeting of diseases and significantly reduce the cost of drug discovery, with the potential to revolutionize the field of drug discovery in the era of generative AI. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. REFORMS: Consensus-based Recommendations for Machine-learning-based Science.
- Author
-
Kapoor, Sayash, Cantrell, Emily M., Kenny Peng, Thanh Hien Pham, Bail, Christopher A., Gundersen, Odd Erik, Hofman, Jake M., Hullman, Jessica, Lones, Michael A., Malik, Momin M., Nanayakkara, Priyanka, Poldrack, Russell A., Raji, Inioluwa Deborah, Roberts, Michael, Salganik, Matthew J., Serra-Garcia, Marta, Stewart, Brandon M., Vandewiele, Gilles, and Narayanan, Arvind
- Subjects
- *
SCIENCE journalism , *REFORMS , *MEDICAL sciences , *RESEARCH personnel , *MAXIMA & minima , *DATA science , *COMPUTER science - Abstract
Machine learning (ML) methods are proliferating in scientific research. However, the adoption of these methods has been accompanied by failures of validity, reproducibility, and generalizability. These failures can hinder scientific progress, lead to false consensus around invalid claims, and undermine the credibility of ML-based science. ML methods are often applied and fail in similar ways across disciplines. Motivated by this observation, our goal is to provide clear recommendations for conducting and reporting ML-based science. Drawing from an extensive review of past literature, we present the REFORMS checklist (recommendations for machine-learning-based science). It consists of 32 questions and a paired set of guidelines. REFORMS was developed on the basis of a consensus of 19 researchers across computer science, data science, mathematics, social sciences, and biomedical sciences. REFORMS can serve as a resource for researchers when designing and implementing a study, for referees when reviewing papers, and for journals when enforcing standards for transparency and reproducibility. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. The Ghost in the Machine: Metaphors of the 'Virtual' and the 'Artificial' in Post-WW2 Computer Science.
- Author
-
Wilson, Joseph
- Subjects
- *
COMPUTER science , *SCIENTIFIC computing , *COMPUTER simulation , *METAPHOR , *RESEARCH personnel , *WORLD War II , *CYBERTERRORISM - Abstract
Metaphors that compare the computer to a human brain are common in computer science and can be traced back to a fertile period of research that unfolded after the Second World War. To conceptualize the emerging "intelligent" properties of computing machines, researchers of the era created a series of virtual objects that served as interpretive devices for representing the immaterial functions of the computer. This paper analyses the use of the terms "artificial" and "virtual" in scientific papers, textbooks, and popular articles of the time, and examines how, together, they shaped models in computer science used to conceptualize computer processes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Fostering the development of computer science graduate employability through agile projects.
- Author
-
Allison, Jordan, Alam, Abu, Gassmann, Luke, Nelson, Gareth, and Zidan, Kamal
- Subjects
- *
COMPUTER science , *EMPLOYMENT , *UNDERGRADUATES , *COLLEGE students , *STUDENTS - Abstract
This article presents the usage of Integrated Course Design (ICD) in the design and evaluation of applying agile methodologies within an undergraduate module of study to foster the development of computer science students employability skills. Undergraduate programs of computer science typically follow traditional educational methods which can lead to students unable to connect knowledge learned in class to actual situations and students are often assessed individually, whereas collaborative group projects are more akin to industry practice. The teaching experience reported gives students the opportunity to relate concepts learnt in class to a practical group-based project. Students must meet the requirements of a 'client' who will provide feedback and additional challenges for students while following the Agile framework SCRUM. Positive student feedback and module grades 7.70% higher than the department average over a four year period indicates the teaching structure and assessment presented is an effective method to foster the development of technical and soft skills of undergraduate computer science students. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Programmatic Strategies to Engage and Support Undergraduate Women in Applied Mathematics and Computer Science.
- Author
-
Han, Sandie, Kennedy, Nadia Stoyanova, Samaroo, Diana, and Duttagupta, Urmi
- Subjects
- *
SCHOLARSHIPS , *COMPUTER science , *APPLIED mathematics , *UNDERGRADUATES , *SELF-efficacy , *COMMUNITY involvement - Abstract
This paper describes the implementation of a STEM scholarship program which utilized a holistic approach to providing a multi-dimensional student support system. The program has been successful in encouraging and supporting women in Applied Mathematics and Computer Science by offering a diverse suite of extracurricular opportunities, actively engaging them in organized events, research projects, and participation in STEM communities, and helping them achieve higher GPAs and shorter times to graduation. The supported women also benefitted from close mentoring relationships with the faculty mentors. The program emphasized the development of empowering settings for women's engagement and achievement, which act to sustain and expand interest in mathematics and computing, and thereby help them to see themselves as future professionals in the field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Diversifying computer science: An examination of the potential influences of women‐in‐computing groups.
- Author
-
Wu, Jue and Uttal, David H.
- Subjects
- *
COMPUTER science , *IMPOSTOR phenomenon , *SUSTAINABILITY , *WOMEN in science - Abstract
The gender imbalance in computer science (CS) is one of the most challenging issues in American education. CS is the only science, technology, engineering, and mathematics (STEM) field in which women's representation has steadily declined in recent decades. In this study, we explored one potential approach that could be effective in increasing college women's participation in CS: participation in Women‐in‐Computing (WiC) groups. Through participant observation and individual interviews in a WiC group at a major research university, we investigated how students engage in WiC, the impacts of the WiC on identity and belonging, and the challenge of sustainability. The results were coded using a hybrid of grounded and deductive coding and indicate that WiC groups offer various programs and events that enable women in CS to fully participate, learn, and grow. WiC represents an identity, a community, a safe space, and a journey. The results also suggest that the WiC has had positive impacts on students' identity and belonging, as evidenced by increased self‐efficacy, reduced imposter syndrome, and enhanced sense of belonging and community. Furthermore, we outline three strategies employed by the WiC to ensure the group's sustainability. Our study sheds light on how WiC can encourage women to enter and persist in CS, and on some of the characteristics of a successful WiC. We demonstrate that WiC may be potentially effective in diversifying CS through identity‐based participation. Moreover, student leaders design both the structure of the group and the leadership continuity process to ensure sustainability. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Using Euler's Formula to Find the Lower Bound of the Page Number.
- Author
-
Zhao, Bin, Li, Peng, Meng, Jixiang, and Zhang, Yuepeng
- Subjects
- *
RANDOM graphs , *COMPUTER science - Abstract
The concept of book embedding, originating in computer science, has found extensive applications in various problem domains. A book embedding of a graph G involves arranging the vertices of G in an order along a line and assigning the edges to one or more half-planes. The page number of a graph is the smallest possible number of half-planes for any book embedding of the graph. Determining the page number is a key aspect of book embedding and carries significant importance. This paper aims to investigate the non-trivial lower bound of the page number for both a graph G and a random graph G ∈ G (n , p) by incorporating two seemingly unrelated concepts: edge-arboricity and Euler's Formula. Our analysis reveals that for a graph G, which is not a path, p n (G) ≥ ⌈ 1 3 a 1 (G) ⌉ , where a 1 (G) denotes the edge-arboricity of G, and for an outerplanar graph, the lower bound is optimal. For G ∈ G (n , p) , p n (G) ≥ ⌈ 1 6 n p (1 - o (1)) ⌉ with high probability, as long as c n ≤ p ≤ 3 (n - 1) 2 n log n . [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. The Past and Future of High Technology.
- Subjects
- *
HIGH technology , *DISCRETE mathematics , *PARALLEL algorithms , *PROGRAMMING languages , *CYBERNETICS - Abstract
This interview was given in 2008 by Arkady Zakrevsky (1928–2014), Corresponding Member of the National Academy of Sciences of Belarus (1972), Doctor of Technical Sciences (1967), and Professor (1969). He stood at the origins of the birth of cybernetics in the Soviet Union. He proposed the programming language for logical tasks LYaPAS, on the basis of which a series of computer-aided design systems for discrete devices was created, and methods for implementing parallel algorithms for the logical control of interacting processes. Some monographs: LYaPAS: A Programming Language for Logic and Coding Algorithms (N.-Y., L.: Academic Press, 1969; with M. A. Gavrilov); Boolesche Gleichungen: Theorie, Anwendung, Algorithmen (Berlin: VEB Verlag Technik, 1984; with Dieter Bochmann and Christian Posthoff); Combinatorial Algorithms of Discrete Mathematics (Tallinn: TUT Press, 2008; with Yu. Pottosin, L. Cheremisinova); Optimization in Boolean Space (Tallinn: TUT Press, 2009; with Yu. Pottosin, L. Cheremisinova); Design of Logical Control Devices (Tallinn: TUT Press, 2009; with Yu. Pottosin, L. Cheremisinova); Combinatorial Calculations in Many-Dimensional Boolean Space (Tallinn: TUT Press, 2012); Solving Large Systems Logical Equations (Tallinn: TUT Press, 2013). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. A Comprehensive Review of Behavior Change Techniques in Wearables and IoT: Implications for Health and Well-Being.
- Author
-
Del-Valle-Soto, Carolina, López-Pimentel, Juan Carlos, Vázquez-Castillo, Javier, Nolazco-Flores, Juan Arturo, Velázquez, Ramiro, Varela-Aldás, José, and Visconti, Paolo
- Subjects
- *
INTERNET of things , *DATABASES , *WELL-being , *COMPUTER science , *STATISTICAL measurement - Abstract
This research paper delves into the effectiveness and impact of behavior change techniques fostered by information technologies, particularly wearables and Internet of Things (IoT) devices, within the realms of engineering and computer science. By conducting a comprehensive review of the relevant literature sourced from the Scopus database, this study aims to elucidate the mechanisms and strategies employed by these technologies to facilitate behavior change and their potential benefits to individuals and society. Through statistical measurements and related works, our work explores the trends over a span of two decades, from 2000 to 2023, to understand the evolving landscape of behavior change techniques in wearable and IoT technologies. A specific focus is placed on a case study examining the application of behavior change techniques (BCTs) for monitoring vital signs using wearables, underscoring the relevance and urgency of further investigation in this critical intersection of technology and human behavior. The findings shed light on the promising role of wearables and IoT devices for promoting positive behavior modifications and improving individuals' overall well-being and highlighting the need for continued research and development in this area to harness the full potential of technology for societal benefit. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Brain-Inspired Agents for Quantum Reinforcement Learning.
- Author
-
Andrés, Eva, Cuéllar, Manuel Pegalajar, and Navarro, Gabriel
- Subjects
- *
ARTIFICIAL neural networks , *REINFORCEMENT learning , *ARTIFICIAL intelligence , *SENSORY memory , *QUANTUM computers , *COMPUTER science , *MIRROR neurons - Abstract
In recent years, advancements in brain science and neuroscience have significantly influenced the field of computer science, particularly in the domain of reinforcement learning (RL). Drawing insights from neurobiology and neuropsychology, researchers have leveraged these findings to develop novel mechanisms for understanding intelligent decision-making processes in the brain. Concurrently, the emergence of quantum computing has opened new frontiers in artificial intelligence, leading to the development of quantum machine learning (QML). This study introduces a novel model that integrates quantum spiking neural networks (QSNN) and quantum long short-term memory (QLSTM) architectures, inspired by the complex workings of the human brain. Specifically designed for reinforcement learning tasks in energy-efficient environments, our approach progresses through two distinct stages mirroring sensory and memory systems. In the initial stage, analogous to the brain's hypothalamus, low-level information is extracted to emulate sensory data processing patterns. Subsequently, resembling the hippocampus, this information is processed at a higher level, capturing and memorizing correlated patterns. We conducted a comparative analysis of our model against existing quantum models, including quantum neural networks (QNNs), QLSTM, QSNN and their classical counterparts, elucidating its unique contributions. Through empirical results, we demonstrated the effectiveness of utilizing quantum models inspired by the brain, which outperform the classical approaches and other quantum models in optimizing energy use case. Specifically, in terms of average, best and worst total reward, test reward, robustness, and learning curve. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Redefining Creativity in the Era of AI? Perspectives of Computer Scientists and New Media Artists.
- Author
-
Wingström, Roosa, Hautala, Johanna, and Lundman, Riina
- Subjects
- *
COMPUTER scientists , *ARTIFICIAL intelligence , *CREATIVE ability , *TRUST , *COMPUTER science - Abstract
Artificial intelligence (AI) has breached creativity research. The advancements of creative AI systems dispute the common definitions of creativity that have traditionally focused on five elements: actor, process, outcome, domain, and space. Moreover, creative workers, such as scientists and artists, increasingly use AI in their creative processes, and the concept of co-creativity has emerged to describe blended human–AI creativity. These issues evoke the question of whether creativity requires redefinition in the era of AI. Currently, co-creativity is mostly studied within the framework of computer science in pre-organized laboratory settings. This study contributes from a human scientific perspective with 52 interviews of Finland-based computer scientists and new media artists who use AI in their work. The results suggest scientists and artists use similar elements to define creativity. However, the role of AI differs between the scientific and artistic creative processes. Scientists need AI to produce accurate and trustworthy outcomes, whereas artists use AI to explore and play. Unlike the scientists, some artists also considered their work with AI co-creative. We suggest that co-creativity can explain the contemporary creative processes in the era of AI and should be the focal point of future creativity research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Instructing with Cognitive Apprenticeship Programming Learning System (CAPLS) for novice computer science college freshmen: An exploration study.
- Author
-
Chih-Chang Yu and Leon Yufeng Wu
- Subjects
- *
INSTRUCTIONAL systems , *COMPUTER science , *COLLEGE freshmen , *BLENDED learning , *APPRENTICESHIP programs , *COMPUTER assisted instruction , *KNOWLEDGE gap theory - Abstract
This study presents a new blended learning model that combines a computer-assisted learning system called Cognitive Apprenticeship Programming Learning System (CAPLS) with instructor co-teaching in an introductory programming course. CAPLS, as its unique aspect, functions as a master in cognitive apprenticeship, guiding learners throughout their learning while also assessing their progress. In contrast, the instructor in physical class settings serves a supportive role, monitoring progress and articulating as needed to fill knowledge gaps. To investigate the impact of this learning model on students' motivation, we used the Motivated Strategies for Learning Questionnaire (MSLQ) at the beginning and end of the semester. College Entrance Math score, midterm and final exams were also used to assess student learning outcomes. The study was conducted with first-year students in the Department of Information and Computer Engineering, and two key findings emerged. First, students' programming proficiency was strongly correlated with their College Entrance Math scores. While math ability impacted programming learning, all students improved their final scores compared to their midterms, with high-scoring math students outperforming their peers. Second, the proposed blended cognitive teaching strategy significantly reduced students' extrinsic goal and self-efficacy levels, but their learning outcomes still significantly improved. This suggests that the proposed teaching model promotes more conscious learning. These results can be used as a reference for improving student learning outcomes and experiences with computer-assisted learning systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Enhancing block cipher security with key-dependent random XOR tables generated via hadamard matrices and Sudoku game.
- Author
-
Hoang, Dinh Linh and Luong, Tran Thi
- Subjects
- *
HADAMARD matrices , *BLOCK ciphers , *UNCERTAINTY (Information theory) , *SUDOKU , *ENCRYPTION protocols , *COMPUTER science - Abstract
The XOR operator is a simple yet crucial computation in computer science, especially in cryptography. In symmetric cryptographic schemes, particularly in block ciphers, the AddRoundKey transformation is commonly used to XOR an internal state with a round key. One method to enhance the security of block ciphers is to diversify this transformation. In this paper, we propose some straightforward yet highly effective techniques for generating t-bit random XOR tables. One approach is based on the Hadamard matrix, while another draws inspiration from the popular intellectual game Sudoku. Additionally, we introduce algorithms to animate the XOR transformation for generalized block ciphers. Specifically, we apply our findings to the AES encryption standard to present the key-dependent AES algorithm. Furthermore, we conduct a security analysis and assess the randomness of the proposed key-dependent AES algorithm using NIST SP 800-22, Shannon entropy based on the ENT tool, and min-entropy based on NIST SP 800-90B. Thanks to the key-dependent random XOR tables, the key-dependent AES algorithm have become much more secure than AES, and they also achieve better results in some statistical standards than AES. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Problems of Connectionism.
- Author
-
Vassallo, Marta, Sattin, Davide, Parati, Eugenio, and Picozzi, Mario
- Subjects
- *
PHILOSOPHY of science , *COGNITIVE science , *PHILOSOPHY of mind , *COMPUTER science , *SCIENTIFIC computing , *ARTIFICIAL intelligence , *COGNITION - Abstract
The relationship between philosophy and science has always been complementary. Today, while science moves increasingly fast and philosophy shows some problems in catching up with it, it is not always possible to ignore such relationships, especially in some disciplines such as philosophy of mind, cognitive science, and neuroscience. However, the methodological procedures used to analyze these data are based on principles and assumptions that require a profound dialogue between philosophy and science. Following these ideas, this work aims to raise the problems that a classical connectionist theory can cause and problematize them in a cognitive framework, considering both philosophy and cognitive sciences but also the disciplines that are near to them, such as AI, computer sciences, and linguistics. For this reason, we embarked on an analysis of both the computational and theoretical problems that connectionism currently has. The second aim of this work is to advocate for collaboration between neuroscience and philosophy of mind because the promotion of deeper multidisciplinarity seems necessary in order to solve connectionism's problems. In fact, we believe that the problems that we detected can be solved by a thorough investigation at both a theoretical and an empirical level, and they do not represent an impasse but rather a starting point from which connectionism should learn and be updated while keeping its original and profoundly convincing core. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Multi-Dimensional Data Analysis Platform (MuDAP): A Cognitive Science Data Toolbox.
- Author
-
Li, Xinlin, Wang, Yiming, Bi, Xiaoyu, Xu, Yalu, Ying, Haojiang, and Chen, Yiyang
- Subjects
- *
COGNITIVE science , *DATA science , *ARTIFICIAL intelligence , *PRINCIPAL components analysis , *RESEARCH personnel - Abstract
Researchers in cognitive science have long been interested in modeling human perception using statistical methods. This requires maneuvers because these multiple dimensional data are always intertwined with complex inner structures. The previous studies in cognitive sciences commonly applied principal component analysis (PCA) to truncate data dimensions when dealing with data with multiple dimensions. This is not necessarily because of its merit in terms of mathematical algorithm, but partly because it is easy to conduct with commonly accessible statistical software. On the other hand, dimension reduction might not be the best analysis when modeling data with no more than 20 dimensions. Using state-of-the-art techniques, researchers in various research disciplines (e.g., computer vision) classified data with more than hundreds of dimensions with neural networks and revealed the inner structure of the data. Therefore, it might be more sophisticated to process human perception data directly with neural networks. In this paper, we introduce the multi-dimensional data analysis platform (MuDAP), a powerful toolbox for data analysis in cognitive science. It utilizes artificial intelligence as well as network analysis, an analysis method that takes advantage of data symmetry. With the graphic user interface, a researcher, with or without previous experience, could analyze multiple dimensional data with great ease. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. AHiLS—An Algorithm for Establishing Hierarchy among Detected Weak Local Reflection Symmetries in Raster Images.
- Author
-
Podgorelec, David, Kolingerová, Ivana, Lovenjak, Luka, and Žalik, Borut
- Subjects
- *
SYMMETRY , *ALGORITHMS , *COMPUTER vision , *COMPUTATIONAL geometry - Abstract
A new algorithm is presented for detecting the local weak reflection symmetries in raster images. It uses contours extracted from the segmented image. A convex hull is constructed on the contours, and so-called anchor points are placed on it. The bundles of symmetry line candidates are placed in these points. Each line splits the plane into two open half-planes and arranges the contours into three sets: the first contains the contours pierced by the considered line, while the second and the third include the contours located in one or the other half-plane. The contours are then checked for the reflection symmetry. This means looking for self-symmetries in the first set, and symmetric pairs with one contour in the second set and one contour in the third set. The line which is evaluated as the best symmetry line is selected. After that, the symmetric contours are removed from sets two and three. The remaining contours are then checked again for symmetry. A multi-branch tree representing the hierarchy of the detected local symmetries is the result of the algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Exploration of image and 3D data segmentation methods: an exhaustive survey.
- Author
-
Briouya, Hasnae, Briouya, Asmae, and Choukri, Ali
- Subjects
- *
THREE-dimensional imaging , *CONVOLUTIONAL neural networks , *COMPUTER science , *RESEARCH personnel - Abstract
The field of image and 3-dimensional (3D) data segmentation is growing fast and has many uses, like in medicine, and robotics. In this article, we explain how computers understand and divide images and 3D data. We compare different ways of doing this in 2D and 3D, and look at the computer methods used. We also discuss recent work and what they discovered. This article gives a broad overview of what's happening in this area of computer science. It explains the goals of the research, how they do it, and what they've found out. It's a useful guide for researchers to understand what's happening now and what challenges they might face in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Real time pedestrian and objects detection using enhanced YOLO integrated with learning complexity-aware cascades.
- Author
-
Khalaf, Ahmed Lateef, Abdulrahman, Mayasa M., Al_Barazanchi, Israa Ibraheem, Tawfeq, Jamal Fadhil, Poh Soon JosephNg, and Radhi, Ahmed Dheyaa
- Subjects
- *
OBJECT recognition (Computer vision) , *PEDESTRIANS , *AUTONOMOUS vehicles , *RESEARCH personnel - Abstract
Numerous technologies and systems, including autonomous vehicles, surveillance systems, and robotic applications, rely on the capability to accurately detect pedestrians to ensure their safety. As the demand for realtime object detection continues to rise, many researchers have dedicated their efforts to developing effective and trustworthy algorithms for pedestrian recognition. By integrating learning complexity-aware cascades with an enhanced you only look once (YOLO) algorithm, the paper presents a real-time system for identifying both items and pedestrians. The performance of the proposed approach is evaluated using the Karlsruhe Institute of Technology and Toyota Technological Institute (KITTI) pedestrian dataset across both the v4 and v8 versions of the YOLO framework. Prioritizing both speed and accuracy, the enhanced YOLO algorithm outperforms its baseline counterpart. The demonstrated superiority of the suggested technique on the KITTI pedestrian dataset underscores its effectiveness in real-world contexts. Furthermore, the complexity-aware learning cascades contribute to a streamlined detection model without compromising performance. When applied to scenarios requiring real-time identification of objects and individuals, the proposed method consistently delivers promising outcomes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Enhancing the performance of network in wireless body area network based on novel encryption algorithm.
- Author
-
Ismael, Othman Atta, Kamil, Ahmed Talal, Jasim, Layth A., and Poh Soon JosephNg
- Subjects
- *
BODY area networks , *ANT algorithms , *NETWORK performance , *DATA encryption , *ALGORITHMS - Abstract
The efficiency of tools used to collect private medical data on people has significantly improved over time. These include implanted, surfacemounted, or encircling devices that form a wireless body area network (WBAN). Although the most recent secure authentication techniques in the industry offer privacy and security, these schemes have a higher time cost for authentication and take longer to complete owing to the restricted computational power of WBAN devices. We provide a novel authentication method depending on the lightweight wearable device scheme for the WBAN environment. Wearable devices are used to capture sensor data from the patient's body in the beginning, after which any redundant data is removed by normalization. The method we suggest for encrypting the data is multi-fractional triphase duplex data encryption (MTDDE) with ant colony optimization (ACO). The method considers not only the security of the data but also the many limitations of sensor nodes, such as battery life, throughput, computing power limitations, and dynamic topology. The thorough research demonstrates that our suggested technique saves computing costs while maintaining security and privacy together with anonymous verification. The suggested system's effectiveness in protecting the privacy and confidentiality of patient health data in WBAN is demonstrated by the simulation model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. A Bibliometric Review of the Ordered Weighted Averaging Operator.
- Author
-
Figuerola-Wischke, Anton, Merigó, José M., Gil-Lafuente, Anna M., and Boria-Reverter, Josefa
- Subjects
- *
BIBLIOMETRICS , *DATABASES , *COMPUTER science , *AGGREGATION operators , *DATA visualization , *SOFTWARE measurement - Abstract
The ordered weighted averaging (OWA) operator was proposed by Yager back in 1988 and constitutes a parameterized family of aggregation functions between the minimum and the maximum. The purpose of this paper is to perform a bibliometric review of this aggregation operator during the last 35 years through the Web of Science (WoS) Core Collection database and the Visualization of Similarities (VOS) viewer software. The results show that the OWA operator is an increasingly popular aggregation operator, especially in Computer Science. The results also allow the assertion that Yager, as expected, is still the most influential and productive author. Moreover, the study reveals that institutions from over 80 countries have contributed to OWA research, highlighting the high presence of Chinese universities and the emergence of Pakistani ones. Other interesting findings are presented to provide a comprehensive and up-to-date analysis of the OWA operator literature. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Maximum Matching Sans Maximal Matching: A New Approach for Finding Maximum Matchings in the Data Stream Model.
- Author
-
Feldman, Moran and Szarf, Ariel
- Subjects
- *
TRIANGLES , *DATA modeling , *COMBINATORIAL optimization , *GREEDY algorithms , *COMPUTER science , *ALGORITHMS - Abstract
The problem of finding a maximum size matching in a graph (known as the maximum matching problem) is one of the most classical problems in computer science. Despite a significant body of work dedicated to the study of this problem in the data stream model, the state-of-the-art single-pass semi-streaming algorithm for it is still a simple greedy algorithm that computes a maximal matching, and this way obtains 1 / 2 -approximation. Some previous works described two/three-pass algorithms that improve over this approximation ratio by using their second and third passes to improve the above mentioned maximal matching. One contribution of this paper continues this line of work by presenting new three-pass semi-streaming algorithms that work along these lines and obtain improved approximation ratios of 0.6111 and 0.5694 for triangle-free and general graphs, respectively. Unfortunately, a recent work Konrad and Naidu (Approximation, randomization, and combinatorial optimization. Algorithms and techniques, APPROX/RANDOM 2021, August 16–18, 2021. LIPIcs, vol 207, pp 19:1–19:18, 2021. https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2021.19) shows that the strategy of constructing a maximal matching in the first pass and then improving it in further passes has limitations. Additionally, this technique is unlikely to get us closer to single-pass semi-streaming algorithms obtaining a better than 1 / 2 -approximation. Therefore, it is interesting to come up with algorithms that do something else with their first pass (we term such algorithms non-maximal-matching-first algorithms). No such algorithms were previously known, and the main contribution of this paper is describing such algorithms that obtain approximation ratios of 0.5384 and 0.5555 in two and three passes, respectively, for general graphs. The main significance of our results is not in the numerical improvements, but in demonstrating the potential of non-maximal-matching-first algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. A survey on IoT trust model frameworks.
- Author
-
Ferraris, Davide, Fernandez-Gago, Carmen, Roman, Rodrigo, and Lopez, Javier
- Subjects
- *
TRUST , *INTERNET of things , *COMPUTER science - Abstract
Trust can be considered as a multidisciplinary concept, which is strongly related to the context and it falls in different fields such as Philosophy, Psychology or Computer Science. Trust is fundamental in every relationship, because without it, an entity will not interact with other entities. This aspect is very important especially in the Internet of Things (IoT), where many entities produced by different vendors and created for different purposes have to interact among them through the internet often under uncertainty. Trust can overcome this uncertainty, creating a strong basis to ease the process of interaction among these entities. We believe that considering trust in the IoT is fundamental, and in order to implement it in any IoT entity, it is fundamental to consider it through the whole System Development Life Cycle. In this paper, we propose an analysis of different works that consider trust for the IoT. We will focus especially on the analysis of frameworks that have been developed in order to include trust in the IoT. We will make a classification of them providing a set of parameters that we believe are fundamental in order to properly consider trust in the IoT. Thus, we will identify important aspects to be taken into consideration when developing frameworks that implement trust in the IoT, finding gaps and proposing possible solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Making sense of 'genetic programs': biomolecular Post–Newell production systems.
- Author
-
Capraru, Mihnea
- Subjects
- *
GENE regulatory networks , *ESCHERICHIA coli , *COMPUTER science - Abstract
The biomedical literature makes extensive use of the concept of a genetic program. So far, however, the nature of genetic programs has received no satisfactory elucidation from the standpoint of computer science. This unsettling omission has led to doubts about the very existence of genetic programs, on the grounds that gene regulatory networks lack a predetermined schedule of execution, which may seem to contradict the very idea of a program. I show, however, that we can make perfect sense of genetic programs, if only we abandon the preconception that all computers have a von Neumann architecture. Instead, genetic programs instantiate the computational architecture of Post–Newell Production Systems. That is, genetic programs are unordered sets of conditional instructions, instructions that fire independently when their conditions are matched. For illustration I present a paradigm Production System that regulates the functioning of the well-known lac operon of E. coli. On close reflection it turns out that not only genes, but also proteins encode instructions. I propose, therefore, to rename genetic programs to biomolecular programs. Biomolecular and/or genetic programs, and the cellular computers than run them, are to be understood not as von Neumann computers, but as Post–Newell production systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Quantum Speedup for the Fast Fourier Transform?
- Author
-
Monroe, Don
- Subjects
- *
QUANTUM computing , *QUANTUM computers , *QUANTUM information science , *COMPUTER science , *FOURIER transforms , *MATHEMATICAL transformations , *ENCRYPTION protocols - Abstract
The article focuses on the work of Peter Shor, professor of applied mathematics at Massachusetts Institute of Technology (MIT), on how quantum computers could break current public-key encryption schemes. The author explains how this method utilizes the the quantum implementation of a Fourier transform.
- Published
- 2023
- Full Text
- View/download PDF
46. On Being a Computer Science Communicator: Facilitating more effective public engagement with a computer science perspective.
- Author
-
Jacobson, Sheldon H.
- Subjects
- *
COMPUTER science , *COMMUNICATION , *PUBLIC opinion , *GOVERNMENT policy , *ATTITUDES toward technology - Abstract
The author writes about the importance of effectively communicating the broad and impactful aspects of computer science, moving beyond technical jargon to engage both educated non-experts and the general public. This involves creating concise "elevator speeches" and utilizing opportunities to bridge the gap in understanding terms like "artificial intelligence" (AI) and "machine learning." He feels that public engagement, such as interacting with journalists, giving interviews, and writing opinion articles, is crucial to demonstrate how computer science can address complex societal issues as well as secure support for the field, and that active participation in public engagement enhances the field's visibility, attracts diverse students, and safeguards its future, particularly in addressing concerns about AI ethics and workforce effects.
- Published
- 2023
- Full Text
- View/download PDF
47. Constraints in math, division by zero and source code.
- Author
-
Polyakova, Inga and Khisamov, Frangiz
- Subjects
- *
SOURCE code , *COMPUTER science , *MATHEMATICS , *LOGARITHMS , *LETTER writing - Abstract
The article studied the possibility of dividing by zero on the set of so-called aggregate numbers, as well as the possibility of calculating logarithms and exponential expressions with a negative basis, logarithms with sublogarithmic expressions less than zero. So we can enrich mathematics by the numbers that are obtained when dividing by zero. You can work with aggregate numbers like ordinary fractions, applying the same laws to them. The article describes the need to abandon counting sticks to denote mathematical operations and the use of universal letter symbols to expand the boundaries of mathematical consciousness and further expand mathematical operations. Knowing the source code written in letter mathoperations, you can «reverse», flip the code and get the source data, which is important for computer science. This way you can save all the operations performed with the number. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Virtual reality application on mental health: A review on functionality.
- Author
-
Hamzah, Irna and Salwana, Ely
- Subjects
- *
DATABASES , *MENTAL health , *ELECTRONICS engineers , *SCIENCE databases , *COMPUTER science - Abstract
Virtual reality (VR) has grown and become more prevalent as technology advances. However, there is a smaller amount of study focusing on the functionality of VR applications in mental health. Therefore, to close the gap, research has been conducted with the aim of reviewing the functionality of VR applications for mental health. The research has performed a systematic literature review (SLR) to investigate the growth of VR applications for mental health. Three significant databases in computer science were involved in the search process, specifically, Scopus, the Institute of Electrical and Electronics Engineers (IEEE), and World of Science (WoS). The result indicates seventy-six papers (76) in three databases. The research analyzed the papers, and the result suggested reviewing four papers. The result also shows that the functionality of virtual reality (VR) applications for mental health is beneficial to the medical sector. However, less research has been conducted specifically on the application functionality. We believe there will be more research on the field in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Deep Fake detection using deep learning.
- Author
-
Gupta, Diksha, Mishra, Shruti, Gupta, Meenu, and Kumar, Rakesh
- Subjects
- *
DEEP learning , *MACHINE learning , *ARTIFICIAL neural networks , *ARTIFICIAL intelligence , *DEEPFAKES , *COMPUTER science - Abstract
Deep learning (DL) is, relatively speaking, a new and emerging field of computer science. Its growth is part of the sudden boom that artificial intelligence (AI) has experienced over the past decade or so. In layman terms, deep learning is the use of massive artificial neural networks (ANNs) to carry out various tasks commonly associated with AI. The world of deep learning comes with its own problems, though. One such problem is that of misinformation and disinformation. Misinformation refers to false, inaccurate or misleading information that is communicated regardless of an intention to deceive. On the other hand, disinformation refers to similar information that is communicated specifically with the intention of deceiving the masses. Deep learning is slowly gaining traction as an effective tool to generate such mis/disinformation. In today's time, it is possible to use Deep Learning algorithms to generate false images, videos and audio involving people, where they may be engaged in an activity that never happened or saying words that they never spoke. Such generated media is called a DeepFake. Deepfakes fall under the disinformation category since there is, in most cases, an intention to deceive. Over the years, due to consistent research, these algorithms have become so good at their jobs that a human cannot be expected to identify a deep fake by looking at the media, unless told explicitly that what they are looking at is a deep fake. In this work, the dataset has been collected from pcloud, which contains both real and deep fake images collected from videos publicly available on the web. The dataset has been split into a training and validation set with a total of 5740 deepfakes and 8270 real images in the training set & 1435 deepfakes and 2067 real images in the validation set. In this work, an exponential decay algorithm has been used which provides an accuracy of 92.52% on validation set using LeRu activation function. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Problems of integration between disciplines in the software engineering undergraduates preparation.
- Author
-
Yusupov, Firnafas, Yusupov, Davronbek, and Takhirova, Gulhayo
- Subjects
- *
SOFTWARE engineering , *INFORMATION & communication technologies , *TRAINING of engineers , *COMPUTER science , *UNDERGRADUATES , *SCIENTIFIC computing - Abstract
This article, as an example of the integration of disciplines, is focused on the issues of combining knowledge, skills and practical experience at all levels of training of software engineering specialists and synthesizing knowledge directed to specific field goals are discussed. At the same time, modern information and communication technologies are considered as a means of integration that connects mathematics and computer sciences with each other. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.