Computer Science: The Computer

Top PDF Computer Science: The Computer:

Supporting Experimental Computer Science

Supporting Experimental Computer Science

2. Computer science studies many objects in order to understand them better. This is the case with hardware (CPU, disks, etc.), programs, data, protocols, algorithms, networks, and so forth. As the technology develops, these objects become increasingly complex. For instance, a distributed-computing infrastructure is composed of several layers (hardware, runtime system, programming environments, applications, etc.) built on top of each other. Understanding such a system requires careful modeling of each layer and the interactions between them. Since the complexity of each layer is already extremely high, it is not feasible to build a precise model of the whole environment. In this case, experiments are necessary to isolate parts of the holistic behavior in order to understand a specific portion of the whole.
Show more

26 Read more

Advantage of Nanotechnology in computer Science

Advantage of Nanotechnology in computer Science

As the development of nanotechnology progresses in several disciplines including physics, chemistry, biology and material science, computer scientists must be aware of their roles and brace themselves for the greater advancement of nanotechnology in the future. This paper has outlined the development of nanotechnology. It is hoped that this gentle review will benefit computer scientists who are keen to contribute their works to the field of nanotechnology. We also suggested the possible opportunities that computer science can offer, which can benefit other nanotechnologists from other fields by helping them be aware of the opportunities from computer science. This paper is intended to promote collaboration between computer scientists and other nanotechnologists. As computer scientists who are interested in the field of nanotechnology, one of our future works is to build a system that consists of a large number of particles automatically forming into a designed structure. By using the PPSO algorithm to control the swarm of particles, each particle performs lightweight computations and holds only a few values. It is anticipated that models such as these will lead to successful bottom-up nanotechnology systems in the future.
Show more

7 Read more

Computer Science is not Enough

Computer Science is not Enough

Information and Communication Technology is a critical component in global change strategies, but it needs to be considered as a component of development rather than as a stand-alone devel- opment sector. The eight UN Millennium Development Goals (none of which list ICTD access, use and capacity building as top goals) have encouraged numerous articles about the transformative role that ICT can and should play in attaining these goals (Gerster and Zimmerman, 2005; InfoDev, 2006). While the MDGs perhaps can be criticized for their normative approach to global iniquities, they have galvanized and coordinated efforts across industry, academia, practitioners, multilateral agencies and foundations, and NGOs. ICTD, especially the ICTD efforts grounded in computer Science, would do well to be as inclusive and cohesive.
Show more

8 Read more

Evaluation of a Game Used to Teach Usability to Undergraduate Students in Computer Science

Evaluation of a Game Used to Teach Usability to Undergraduate Students in Computer Science

Teaching computing professionals HCI concepts is important and should be included as part of computer science courses at all levels (ACM & IEEE, 2008; ACM SIGCHI, 2009; Pow-Sang, Rusu, Zapata, & Roncagliolo, 2009; Rusu & Rusu, 2007). Usability is a core concept of HCI, and one of the most common definitions of usability that is appropriate for this concept is defined by ISO 9241-11 (2010): "the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use." Usability refers to a set of concepts such as time of execution, performance, user satisfaction, and learning facility (Abran, Khelifi, Suryn, & Seffah, 2003). Activities designed to promote usability are studied for usability engineering; these activities are carried out in the process of software development, which creates a connection between users and developers (ACM & IEEE, 2008; Cooke & Mings, 2005; Mayhew, 1999).
Show more

19 Read more

Computer Science Begins at Fisher

Computer Science Begins at Fisher

I’m sure the Computer Science department has come a long way since the beginnings in the early 1980s that I have described here. PCs are everywhere and now we couldn’t get along without the Internet available to us at all times. It’s interesting that when I look at a list of the current faculty I still see many of my former professors even though it’s been over 30 years since I attended my first course at Fisher. Not only is it a great place for students to attend, but it must be a great place for faculty to work. I enjoyed my time at Fisher. I left Fisher prepared to continue on my studies at the graduate level and to succeed in a competitive working environment.
Show more

6 Read more

Understanding computer science : how the discipline of computer science develops new understanding

Understanding computer science : how the discipline of computer science develops new understanding

My thesis shows that computer science has created a new way to understand structure. Therefore, the practices of computer science could be viewed as a new way of doing science. What kind of issues did computer scientists encounter when pioneering with this new way of doing science? How do these issues relate to the nature of their ‘model’? And how did they find ways to deal with those issues? Also, this new method of doing science is hard to grasp for many people. Many even contest that computer science is a science. Somehow, we do not clearly see what computer science is and does. The methodology of other sciences, such as biology and physics, seems much more straightforward.
Show more

127 Read more

Logicism and the development of computer science

Logicism and the development of computer science

It is now easier to see how the methods which Frege used in his search for certainty in mathematics created a system suitable for use in computer science. What Frege is doing is in effect mechanising the process of checking the validity of a proof. If a proof is written out in the characteristic human semi-formal style, then its validity cannot be checked mechanically. One needs a skilled human mathematician to apply his or her intuition to ‘see’ whether a particular line follows from the previous ones. Once a proof has been formalised, however, it is a purely mechanically matter to check whether the proof is valid using the prescribed set of rules of inference. Thus Frege’s work can be seen as replacing the craft skills of a human mathematician with a mechanical process.4
Show more

17 Read more

Computer Science: Reflection and Future

Computer Science: Reflection and Future

“weak” is used in an axiomatic sense like semi-groups vs. groups, distributive lattices vs. Boolean algebras, projective vs. Eucledian geometry. These topics, perhaps due to lack of stimulating applications, have always existed as topics of peripheral interest within mathematics. The requirements of Computer Science completely changed the situation. Computer Science needed ideas from these topics and in turn stimulated the development within these topics by posing questions which would not have been posed otherwise. Right from the days of germination of ENIAC/ EDSAC, John von Neumann had been advocating that computers would not be just a tool for aiding science but a way of doing science. With the computing reaching a stage of robustness in terms of hardware, software and user interface by early 1970s (time around which Computer Science germination happened in India — thanks to TIFR and IIT Kanpur) and the use of computers in science & engineering gained momentum. Ken Wilson, a Nobel Laureate in Physics, promoted an idea that simulation on computers was a way to do science and scale-up discoveries and inventions. It may be noted that Wilson’s breakthroughs were realized through computational models whose simulations produced radical understanding of phase changes in materials. In fact, he championed the promotion of computational science saying that grand challenges in science could be cracked through computers. He went on to call that computation has become a third leg of science. His promotions lead to formal streams under “Computational Sciences” and also government funding for building computers increased quite substantially leading to further technological
Show more

19 Read more

Computer science education teaching methods: An overview of the literature

Computer science education teaching methods: An overview of the literature

Computer science education teaching methods: An overview of the literature Articles from LOG IN magazine - Several articles in the computer science educational magazine LOG IN are interesting from methodological and practical teaching standpoints. LOG IN already raised awareness of the necessity of new methods in computer science education ten years ago (Seiffert & Koerber, 2003). Among the writings found in the LOG IN heading “Praxis & Methodik” (‘Practice & Methodology’) there are reports featuring the following teaching methods: direct instruction (Tiburski, 2010), inductive approaches (Müller, 2008), research-based learning and experiment (Müller, 2006a, 2006b, Müller, 2010; Schulz & Witten 2010), concept mapping (Ertl & Mok, 2010), discovery learning (Hromkovic, 2011), problem solving (Baumann 2007; Thiele, 2008), self-directed learning (Homberg, 2006), project teaching (Ambros, 1992; Müller 2011); simulation and modeling (Steinkamp, 2004; Bierschneider-Jakobs, 2005; Wiesner, 2008; Vollmer, 2011), and role play (Fothe, 2006; Tiburski, 2010; Baumann, 2010; Link, 2011). Attention should be drawn to another aspect in connection with LOG IN magazine; namely the context-orientation in computer science education, a concept for the planning and arrangement of computer science education oriented on the everyday experiences that school pupils inhabit (Diethelm, 2011; Dietz, & Oppermann, 2011; Diethelm, Koubek, & Witten, 2011).
Show more

10 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

To enable remote invocation, all data mining algorithms provided by Weka library are exposed as grid services.Weka4WS has been designed and developed by using the emerg[r]

8 Read more

Foundations of Computer Science pdf

Foundations of Computer Science pdf

Computers also interact with the outside world. For a start, they need some means of accepting problems and delivering solutions. Many computer systems monitor and control industrial processes. This role of computers is familiar now, but was never envisaged at first. Modelling it requires a notion of states that can be observed and changed. Then we can consider updating the state by assigning to variables or performing input/output, finally arriving at conventional programs (familiar to those of you who know C, for instance) that consist of commands.

155 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

We use computers for banking and investing to shopping and communicating with others through email or chat programs. Computer and network of computer become the very important part of companies, organization and government sector. A lot of important information is stored in computers and transferred across networks and the internet. Unauthorized users may try to break into systems to have access to private information. This brings the need of a system that can detect and prevent those harmful activities. Intrusion detection systems (IDSs) monitor networks and/or systems to detect malicious activities. That helps us to re-act and stop intruders. There are two types of IDSs, network-based IDSs and host-based IDSs. A network-based IDS monitor’s network traffic and activities to find attacks, and a host-based IDS monitors activities in a computer system to detect malicious actions. This thesis is a research on using Bayesian techniques in implementing a network-based IDS that can tell us a computer process is normal (harmless) or abnormal (harmful). We combine three techniques to build a IDS. In our system k2 algorithm is applied which main purpose is to incrementally add a node to a network, it means start with a single node than add another node to complete a network. Bayesian methods utilize a search-and-source procedure to search the space of DAGs, and use the posterior density as a scoring function and finally to construct a data structure called a junction tree which can be used to calculate any query through message passing on the tree. In a past a lot of research is done on a IDS but for a wireless network is little. We have combine three techniques to make sure that network is safe from unauthorized access and attacks.
Show more

9 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Satinder Pal Ahuja “ Brief Description of Routing Protocols in MANETS And Performance And Analysis (AODV, AOMDV, TORA)” compared and evaluate the performance of three[r]

7 Read more

Computer science lab manual.pdf

Computer science lab manual.pdf

A computer is an electronic device, which mainly performs the four functions as reading, processing, displaying and storing on data. These functions of a computer system can be carried out by using the three main units namely input unit, system unit and output unit.
The block diagram of a computer system is as follows :

31 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

We also showed that FoCUS can effect ively apply learned forum crawling knowledge on 160 unseen forums to automatically collect index URL, thread URL, and page-flipping URL trai[r]

16 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Figure 5.Activity Diagram for PPA approval.. Approval of absenteeism can only be done by the unit head office at the minimum and not the name itself. The process starts from selecting l[r]

13 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Abstract— The design of the sales system in Sueweetiesid is based on the fan club of Korean artist Bae Suzy who wants Korean merchandise, started using social media to promote [r]

13 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Decision support system (DSS) is a part of a information system based computer which is used to support decision making in an organization or company. It can also [r]

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

In order to focus more on research problems, here are the limitations of research : 1) This influencer data management information system is web-based. 2) Users of this system are devot[r]

14 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Homographs, words with same spelling and different translations are more problematic to detect in Persian because not all the pronounced vowels are written in the text[r]

42 Read more

Show all 10000 documents...