Computer Science (miscellaneous)

Top PDF Computer Science (miscellaneous):

Supporting Experimental Computer Science

Supporting Experimental Computer Science

2. Computer science studies many objects in order to understand them better. This is the case with hardware (CPU, disks, etc.), programs, data, protocols, algorithms, networks, and so forth. As the technology develops, these objects become increasingly complex. For instance, a distributed-computing infrastructure is composed of several layers (hardware, runtime system, programming environments, applications, etc.) built on top of each other. Understanding such a system requires careful modeling of each layer and the interactions between them. Since the complexity of each layer is already extremely high, it is not feasible to build a precise model of the whole environment. In this case, experiments are necessary to isolate parts of the holistic behavior in order to understand a specific portion of the whole.
Show more

26 Read more

Understanding computer science : how the discipline of computer science develops new understanding

Understanding computer science : how the discipline of computer science develops new understanding

My thesis shows that computer science has created a new way to understand structure. Therefore, the practices of computer science could be viewed as a new way of doing science. What kind of issues did computer scientists encounter when pioneering with this new way of doing science? How do these issues relate to the nature of their ‘model’? And how did they find ways to deal with those issues? Also, this new method of doing science is hard to grasp for many people. Many even contest that computer science is a science. Somehow, we do not clearly see what computer science is and does. The methodology of other sciences, such as biology and physics, seems much more straightforward.
Show more

127 Read more

Computer science education teaching methods: An overview of the literature

Computer science education teaching methods: An overview of the literature

Computer science education teaching methods: An overview of the literature Articles from LOG IN magazine - Several articles in the computer science educational magazine LOG IN are interesting from methodological and practical teaching standpoints. LOG IN already raised awareness of the necessity of new methods in computer science education ten years ago (Seiffert & Koerber, 2003). Among the writings found in the LOG IN heading “Praxis & Methodik” (‘Practice & Methodology’) there are reports featuring the following teaching methods: direct instruction (Tiburski, 2010), inductive approaches (Müller, 2008), research-based learning and experiment (Müller, 2006a, 2006b, Müller, 2010; Schulz & Witten 2010), concept mapping (Ertl & Mok, 2010), discovery learning (Hromkovic, 2011), problem solving (Baumann 2007; Thiele, 2008), self-directed learning (Homberg, 2006), project teaching (Ambros, 1992; Müller 2011); simulation and modeling (Steinkamp, 2004; Bierschneider-Jakobs, 2005; Wiesner, 2008; Vollmer, 2011), and role play (Fothe, 2006; Tiburski, 2010; Baumann, 2010; Link, 2011). Attention should be drawn to another aspect in connection with LOG IN magazine; namely the context-orientation in computer science education, a concept for the planning and arrangement of computer science education oriented on the everyday experiences that school pupils inhabit (Diethelm, 2011; Dietz, & Oppermann, 2011; Diethelm, Koubek, & Witten, 2011).
Show more

10 Read more

Evaluation of a Game Used to Teach Usability to Undergraduate Students in Computer Science

Evaluation of a Game Used to Teach Usability to Undergraduate Students in Computer Science

Teaching computing professionals HCI concepts is important and should be included as part of computer science courses at all levels (ACM & IEEE, 2008; ACM SIGCHI, 2009; Pow-Sang, Rusu, Zapata, & Roncagliolo, 2009; Rusu & Rusu, 2007). Usability is a core concept of HCI, and one of the most common definitions of usability that is appropriate for this concept is defined by ISO 9241-11 (2010): "the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use." Usability refers to a set of concepts such as time of execution, performance, user satisfaction, and learning facility (Abran, Khelifi, Suryn, & Seffah, 2003). Activities designed to promote usability are studied for usability engineering; these activities are carried out in the process of software development, which creates a connection between users and developers (ACM & IEEE, 2008; Cooke & Mings, 2005; Mayhew, 1999).
Show more

19 Read more

Adversity Quotient of Bachelor of Science In Computer Science Students At Eastern Samar State University Salcedo Campus

Adversity Quotient of Bachelor of Science In Computer Science Students At Eastern Samar State University Salcedo Campus

This study made use of a descriptive design since it describes the characteristics of the respondents in terms of their personal profile and their adversity quotient. The Bachelor of Science in Computer Science students enrolled during the first semester of school year 2015-2016 served as the participants of this study. However, only four hundred nineteen (419) out of five hundred ninety four (594) or 70.53 percent of the population responded the time when the questionnaire was administered. This study used a survey questionnaire as the main instrument in collecting data from the student-respondent. Then, data were gathered, tallied, computed, interpreted, and analyzed using descriptive statistics.
Show more

5 Read more

Computer Science Begins at Fisher

Computer Science Begins at Fisher

I’m sure the Computer Science department has come a long way since the beginnings in the early 1980s that I have described here. PCs are everywhere and now we couldn’t get along without the Internet available to us at all times. It’s interesting that when I look at a list of the current faculty I still see many of my former professors even though it’s been over 30 years since I attended my first course at Fisher. Not only is it a great place for students to attend, but it must be a great place for faculty to work. I enjoyed my time at Fisher. I left Fisher prepared to continue on my studies at the graduate level and to succeed in a competitive working environment.
Show more

6 Read more

Advantage of Nanotechnology in computer Science

Advantage of Nanotechnology in computer Science

As the development of nanotechnology progresses in several disciplines including physics, chemistry, biology and material science, computer scientists must be aware of their roles and brace themselves for the greater advancement of nanotechnology in the future. This paper has outlined the development of nanotechnology. It is hoped that this gentle review will benefit computer scientists who are keen to contribute their works to the field of nanotechnology. We also suggested the possible opportunities that computer science can offer, which can benefit other nanotechnologists from other fields by helping them be aware of the opportunities from computer science. This paper is intended to promote collaboration between computer scientists and other nanotechnologists. As computer scientists who are interested in the field of nanotechnology, one of our future works is to build a system that consists of a large number of particles automatically forming into a designed structure. By using the PPSO algorithm to control the swarm of particles, each particle performs lightweight computations and holds only a few values. It is anticipated that models such as these will lead to successful bottom-up nanotechnology systems in the future.
Show more

7 Read more

Logicism and the development of computer science

Logicism and the development of computer science

It is now easier to see how the methods which Frege used in his search for certainty in mathematics created a system suitable for use in computer science. What Frege is doing is in effect mechanising the process of checking the validity of a proof. If a proof is written out in the characteristic human semi-formal style, then its validity cannot be checked mechanically. One needs a skilled human mathematician to apply his or her intuition to ‘see’ whether a particular line follows from the previous ones. Once a proof has been formalised, however, it is a purely mechanically matter to check whether the proof is valid using the prescribed set of rules of inference. Thus Frege’s work can be seen as replacing the craft skills of a human mathematician with a mechanical process.4
Show more

17 Read more

Computer Science: Reflection and Future

Computer Science: Reflection and Future

“weak” is used in an axiomatic sense like semi-groups vs. groups, distributive lattices vs. Boolean algebras, projective vs. Eucledian geometry. These topics, perhaps due to lack of stimulating applications, have always existed as topics of peripheral interest within mathematics. The requirements of Computer Science completely changed the situation. Computer Science needed ideas from these topics and in turn stimulated the development within these topics by posing questions which would not have been posed otherwise. Right from the days of germination of ENIAC/ EDSAC, John von Neumann had been advocating that computers would not be just a tool for aiding science but a way of doing science. With the computing reaching a stage of robustness in terms of hardware, software and user interface by early 1970s (time around which Computer Science germination happened in India — thanks to TIFR and IIT Kanpur) and the use of computers in science & engineering gained momentum. Ken Wilson, a Nobel Laureate in Physics, promoted an idea that simulation on computers was a way to do science and scale-up discoveries and inventions. It may be noted that Wilson’s breakthroughs were realized through computational models whose simulations produced radical understanding of phase changes in materials. In fact, he championed the promotion of computational science saying that grand challenges in science could be cracked through computers. He went on to call that computation has become a third leg of science. His promotions lead to formal streams under “Computational Sciences” and also government funding for building computers increased quite substantially leading to further technological
Show more

19 Read more

Computer Science is not Enough

Computer Science is not Enough

As a research area, ICTD is just now emerging as a clearly identifiable focus – there are perhaps a half dozen respected ICTD journals, and the premier conference in the field is less than four years old. A 2010 report shows that the field is growing, with several hundred academic research- ers and several thousand graduate students working in some aspect of ICTD (Heeks, 2010). Al- though ICTD is emerging as a formal discipline at several of universities internationally, only a few programs related to ICTD exist in the United States. These programs primarily cater to the doctoral student, although there is a trend towards master’s level programs, including ICTD certificate curri- cula and the announcement of two Master’s degrees in ICTD to bring the total “practitioner” pro- grams worldwide to six – of which five are in the European Union. Of the 100 ICTD courses taught at Universities worldwide, only 20% are taught in computer science departments.
Show more

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

To enable remote invocation, all data mining algorithms provided by Weka library are exposed as grid services.Weka4WS has been designed and developed by using the emerg[r]

8 Read more

Computer science lab manual.pdf

Computer science lab manual.pdf

A computer is an electronic device, which mainly performs the four functions as reading, processing, displaying and storing on data. These functions of a computer system can be carried out by using the three main units namely input unit, system unit and output unit.
The block diagram of a computer system is as follows :

31 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

We also showed that FoCUS can effect ively apply learned forum crawling knowledge on 160 unseen forums to automatically collect index URL, thread URL, and page-flipping URL trai[r]

16 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Figure 5.Activity Diagram for PPA approval.. Approval of absenteeism can only be done by the unit head office at the minimum and not the name itself. The process starts from selecting l[r]

13 Read more

Foundations of Computer Science pdf

Foundations of Computer Science pdf

Because of its connection to mathematics, ML programs can be designed and understood without thinking in detail about how the computer will run them. Although a program can abort, it cannot crash: it remains under the control of the ML system. It still achieves respectable efficiency and pro- vides lower-level primitives for those who need them. Most other languages allow direct access to the underlying machine and even try to execute illegal operations, causing crashes.

155 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Abstract— The design of the sales system in Sueweetiesid is based on the fan club of Korean artist Bae Suzy who wants Korean merchandise, started using social media to promote [r]

13 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Decision support system (DSS) is a part of a information system based computer which is used to support decision making in an organization or company. It can also [r]

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

In order to focus more on research problems, here are the limitations of research : 1) This influencer data management information system is web-based. 2) Users of this system are devot[r]

14 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Homographs, words with same spelling and different translations are more problematic to detect in Persian because not all the pronounced vowels are written in the text[r]

42 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

subay düĢ qurtar iĢlҽt lap A lot of words entered to both languages from Arabic and Persian which have same meanings. Since 1929 for Neighbors’ Turkish languages and since 1928 for Turkish a lot of foreign words have been entered mostly for new equipment and science for Neighbors’ Turkish languages foreign words and for Turkish English; Italian words. 3.3 SENTENCES In both of languages making sentences mostly are same the place of verbs nouns adverbs etc. By applying the above rules we can get the acceptable result. In following examples only we use the words started with the character “I”:Istifa ibraz iblis icraya ihtimal ihtiyaç ihdas ihya icat ihtilaf ihtar iddia irsı izdiham iskelet iskele islam isim ismet ishal iĢtah iĢgal isabet israr ıstılahıslah ıslahat itaat iade itibar itiraz itimat itina idam iftar ikamet iktidar iktisat ıtiraf iklim imam imtihan imza imkan imla intihar intikam incir insan insaf inkar icap icat ihanet.In following examples only we use the words started with the character “b”:Bağ dahçe bahçivan bakla baklava balans bamya bahis buhar baht bahtiyar bedel beden basıret batın bazı bazen bakkal bohça bakiye bela bülbül büluğ bend bünye bahar bahane bühtan basiret beyit bayat biçare bel beyhude. Here we try to give more explanations suppose The number of characters in one word is equal to n The number of rules apply at same time is equal to m If the word has any characters like “ q”, ” x”, ” ҽ” which does not exist in Turkish the word called xw words. If the word has not any characters like “q”,” x”, ҽ” which does not exist in Turkish the word called yw words. q Is constant value related to xw and yw such that almost q yw =1.5*q xw Then easily
Show more

36 Read more

Show all 10000 documents...