Science topics: Computer Science
Science topic

Computer Science - Science topic

Explore the latest publications in Computer Science, and find Computer Science experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Computer Science (10,000)
Sorted by most recent
Chapter
Full-text available
A seventieth birthday is an appropriate occasion to look back on the life path so far. In the following, this is done for Professor Peter Marwedel from the perspective of the Department of Computer Science of TU Dortmund University, where he spent the essential time of his professional life.
Chapter
Full-text available
ASSISTECH is an inter-disciplinary laboratory located in Amar Nath Sashi Khosla School of Information Technology and is born out of the initial work of faculty and students in Department of Computer Science and Engineering. ASSISTECH has achieved some success in its 12 + years of existence in not only designing affordable products and solutions for...
Article
Full-text available
Computer vision has greatly advanced recently. Since AlexNet was first introduced, many modified deep learning architectures have been developed and they are still evolving. However, there are few studies comparing these architectures in the field of ophthalmology. This study compared the performance of various state-of-the-art deep-learning archit...
Article
Full-text available
Critical nodes in temporal networks play more significant role than other nodes on the structure and function of networks. The research on identifying critical nodes in temporal networks has attracted much attention since the real-world systems can be illustrated more accurately by temporal networks than static networks. Considering the topological...
Article
Full-text available
Crucial problems of the quantum Internet are the derivation of stability properties of quantum repeaters and theory of entanglement rate maximization in an entangled network structure. The stability property of a quantum repeater entails that all incoming density matrices can be swapped with a target density matrix. The strong stability of a quantu...
Article
Full-text available
The human brain processes language to optimise efficient communication. Studies have shown extensive evidence that the brain’s response to language is affected both by lower-level features, such as word-length and frequency, and syntactic and semantic violations within sentences. However, our understanding on cognitive processes at discourse level...
Article
Full-text available
Subtle interstitial changes in the lung parenchyma of smokers, known as Interstitial Lung Abnormalities (ILA), have been associated with clinical outcomes, including mortality, even in the absence of Interstitial Lung Disease (ILD). Although several methods have been proposed for the automatic identification of more advanced Interstitial Lung Disea...
Article
Full-text available
The description of user behavior in social networks is an important issue for studying social networks. Given that Petri nets can describe the resource flow problem, this study utilizes the features of Petri nets to portray the user behavior states during the message propagation of a micro-blog network and presents an information propagation formal...
Article
Full-text available
Synthetic DNA is gaining momentum as a potential storage medium for archival data storage. In this process, digital information is translated into sequences of nucleotides and the resulting synthetic DNA strands are then stored for later retrieval. Here, we demonstrate reliable file recovery with PCR-based random access when as few as ten copies pe...
Article
Full-text available
Accurate and comprehensive measurements of economic well-being are fundamental inputs into both research and policy, but such measures are unavailable at a local level in many parts of the world. Here we train deep learning models to predict survey-based estimates of asset wealth across ~ 20,000 African villages from publicly-available multispectra...
Article
Full-text available
Telementoring platforms can help transfer surgical expertise remotely. However, most telementoring platforms are not designed to assist in austere, pre-hospital settings. This paper evaluates the system for telementoring with augmented reality (STAR), a portable and self-contained telementoring platform based on an augmented reality head-mounted di...
Article
Full-text available
This work presents a new range searching algorithm for multidimensional databases. The proposed methodology is based on the idea of generating a navigation metadata structure, complementary to the database, that eases the navigation between the elements of the database. This metadata structure can be adapted to different problems and it is generate...
Article
Full-text available
Network embedding techniques are powerful to capture structural regularities in networks and to identify similarities between their local fabrics. However, conventional network embedding models are developed for static structures, commonly consider nodes only and they are seriously challenged when the network is varying in time. Temporal networks m...
Article
Full-text available
Artificial neural networks are notoriously power- and time-consuming when implemented on conventional von Neumann computing systems. Consequently, recent years have seen an emergence of research in machine learning hardware that strives to bring memory and computing closer together. A popular approach is to realise artificial neural networks in har...
Article
Full-text available
Deep neural networks have advanced the field of detection and classification and allowed for effective identification of signals in challenging data sets. Numerous time-critical conservation needs may benefit from these methods. We developed and empirically studied a variety of deep neural networks to detect the vocalizations of endangered North At...
Article
Full-text available
Background: With the rapid development of whole exome sequencing (WES), an increasing number of tools are being proposed for copy number variation (CNV) detection based on this technique. However, no comprehensive guide is available for the use of these tools in clinical settings, which renders them inapplicable in practice. To resolve this proble...
Article
Full-text available
Entangled quantum networks are a fundamental of any global-scale quantum Internet. Here, a mathematical model is developed to quantify the dynamics of entangled network structures and entanglement flow in the quantum Internet. The analytical solutions of the model determine the equilibrium states of the entangled quantum networks and characterize t...
Article
Full-text available
Medical image segmentation is an important tool for current clinical applications. It is the backbone of numerous clinical diagnosis methods, oncological treatments and computer-integrated surgeries. A new class of machine learning algorithm, deep learning algorithms, outperforms the results of classical segmentation in terms of accuracy. However,...
Article
Full-text available
Depression diagnosis is one of the most important issues in psychiatry. Depression is a complicated mental illness that varies in symptoms and requires patient cooperation. In the present study, we demonstrated a novel data-driven attempt to diagnose depressive disorder based on clinical questionnaires. It includes deep learning, multi-modal repres...
Article
Full-text available
Current computers are limited by the von Neumann bottleneck, which constrains the throughput between the processing unit and the memory. Chemical processes have the potential to scale beyond current computing architectures as the processing unit and memory reside in the same space, performing computations through chemical reactions, yet their lack...
Article
Full-text available
Segmentation is fundamental to medical image analysis. Recent advances in fully convolutional networks has enabled automatic segmentation; however, high labeling efforts and difficulty in acquiring sufficient and high-quality training data is still a challenge. In this study, a cascaded 3D U-Net with active learning to increase training efficiency...
Article
Full-text available
Object detection is an important component of computer vision. Most of the recent successful object detection methods are based on convolutional neural networks (CNNs). To improve the performance of these networks, researchers have designed many different architectures. They found that the CNN performance benefits from carefully increasing the dept...
Article
Full-text available
The Coronavirus Infectious Disease Ontology (CIDO) is a community-based ontology that supports coronavirus disease knowledge and data standardization, integration, sharing, and analysis.
Article
Full-text available
We propose a homomorphic search protocol based on quantum homomorphic encryption, in which a client Alice with limited quantum ability can give her encrypted data to a powerful but untrusted quantum server and let the server search for her without decryption. By outsourcing the interactive key-update process to a trusted key center, Alice only need...
Article
Full-text available
We present semi-supervised information maximizing self-argument training (IMSAT), a neural network-based classification method that works without the preparation of labeled data. Semi-supervised IMSAT can amplify specific differences and avoid undesirable misclassification in accordance with the purpose. We demonstrate that semi-supervised IMSAT ha...
Article
Full-text available
Many physiology experiments demonstrate that an organism’s cortex and receptor system can be artificially extended, giving the organism new types of perceptual capabilities. To examine artificial extension of the cortex-receptor system, I propose a computational model that allows new types of sensory pathways to be added directly to the computation...
Article
Full-text available
Deep neural networks have gained immense popularity in the Big Data problem; however, the availability of training samples can be relatively limited in specific application domains, particularly medical imaging, and consequently leading to overfitting problems. This “Small Data” challenge may need a mindset that is entirely different from the exist...
Article
Full-text available
Despite decades of research, effective treatments for most cancers remain elusive. One reason is that different instances of cancer result from different combinations of multiple genetic mutations (hits). Therefore, treatments that may be effective in some cases are not effective in others. We previously developed an algorithm for identifying combi...
Article
Full-text available
Quantum computers provide a valuable resource to solve computational problems. The maximization of the objective function of a computational problem is a crucial problem in gate-model quantum computers. The objective function estimation is a high-cost procedure that requires several rounds of quantum computations and measurements. Here, we define a...
Article
Full-text available
Amyotrophic Lateral Sclerosis (ALS) is an inexorably progressive neurodegenerative condition with no effective disease modifying therapies. The development and validation of reliable prognostic models is a recognised research priority. We present a prognostic model for survival in ALS where result uncertainty is taken into account. Patient data wer...
Article
Full-text available
We develop graphlet analysis for multiplex networks and discuss how this analysis can be extended to multilayer and multilevel networks as well as to graphs with node and/or link categorical attributes. The analysis has been adapted for two typical examples of multiplexes: economic trade data represented as a 957-plex network and 75 social networks...
Article
Full-text available
Hand-foot-and-month disease (HFMD), especially the enterovirus A71 (EV-A71) subtype, is a major health problem in Beijing, China. Previous studies mainly used regressive models to forecast the prevalence of HFMD, ignoring its intrinsic age groups. This study aims to predict HFMD of EV-A71 subtype in three age groups (0–3, 3–6 and > 6 years old) fro...
Article
Full-text available
The use of strongly biased data generally leads to large distortions in a trained machine learning model. We face this problem when constructing a predictor for earthquake-generated ground-motion intensity with machine learning. The machine learning predictor constructed in this study has an underestimation problem for strong motions, although the...
Article
Full-text available
Abstract Recently, an increasing body of work investigates networks with multiple types of links. Variants of such systems have been examined decades ago in disciplines such as sociology and engineering, but only recently have they been unified within the framework of multilayer networks. In parallel, many aspects of real systems are increasingly a...
Article
Full-text available
Spiking neural networks (SNNs) are considered as the third generation of artificial neural networks, having the potential to improve the energy efficiency of conventional computing systems. Although the firing rate of a spiking neuron is an approximation of rectified linear unit (ReLU) activation in an analog-valued neural network (ANN), there rema...
Article
Full-text available
A semi-counterfactual quantum bit commitment (SCQBC) protocol is presented here for the first time, which makes use of counterfactual property. Similar to a counterfactual quantum key distribution scheme, half-photons are not transmitted through the quantum channel in our proposed protocol. In the SCQBC protocol, Bob, the verification party of the...
Article
Full-text available
Most of the existing recognition algorithms are proposed for closed set scenarios, where all categories are known beforehand. However, in practice, recognition is essentially an open set problem. There are categories we know called “knowns”, and there are more we do not know called “unknowns”. Enumerating all categories beforehand is never possible...
Article
Full-text available
Multilayer optical film plays a significant role in broad fields of optical application. Due to the nonlinear relationship between the dispersion characteristics of optical materials and the actual performance parameters of optical thin films, it is challenging to optimize optical thin film structure with the traditional models. In this paper, we p...
Article
Full-text available
The summation and multiplication are two basic operations for secure multiparty quantum computation. The existing secure multiparty quantum summation and multiplication protocols have (n, n) threshold approach and their computation type is bit-by-bit, where n is total number of players. In this paper, we propose two hybrid (t, n) threshold quantum...
Article
Full-text available
Overparametrized deep networks predict well, despite the lack of an explicit complexity control during training, such as an explicit regularization term. For exponential-type loss functions, we solve this puzzle by showing an effective regularization effect of gradient descent in terms of the normalized weights that are relevant for classification....
Article
Full-text available
Deep ultraviolet lasers based on the phenomenon of mode-locking have been used widely in many areas in recent years, for example, in semiconductors, the environment and biomedicine. In the development of a mode-locked deep ultraviolet laser, one of the most important aspects is to optimize the multiple parameters of the complex system. Traditional...
Article
Full-text available
Image-based automatic classification of vector mosquitoes has been investigated for decades for its practical applications such as early detection of potential mosquitoes-borne diseases. However, the classification accuracy of previous approaches has never been close to human experts’ and often images of mosquitoes with certain postures and body pa...
Conference Paper
Full-text available
We present an ongoing collaboration between computer science researchers and fact-checking experts in a broadcast corporation to develop Watch 'n' Check, a social media monitoring tool that assists fact-checkers to detect and target misinformation online. The lean methodology followed in our collaboration has helped us to better understand how info...
Article
Full-text available
Citations have been an acceptable journal performance metric used by many indexing databases for inclusion and discontinuation of journals in their list. Therefore, editorial teams must maintain their journal performance by increasing article citations for continuous content indexing in the databases. With this aim in hand, this study intended to a...
Conference Paper
Full-text available
This work-in-progress (WIP) paper in the research track explored the muddiest point and self-efficacy for students in introductory computer science courses, starting with one course at a southern public institution. With the increasing demand in computing-related careers, the increased enrollments in undergraduate computer science courses are facin...
Article
Full-text available
Data structure is a foundation subject for computer science students in Malaysian universities. To fully grasp the subject, students are required to do a lot of exercises. Many students, however, are lacking the motivation to either carry out the exercises or to actively participate in the teaching and learning process. As a result, they find it di...
Article
Full-text available
Ce texte propose une synthèse de développement d'un cadre de référence T4TEL qui, à l'origine, a été développé pour répondre à des besoins de conception d'environnements informatiques. Nous présentons ses fondements, son intérêt et ses apports dans des recherches en didactique des mathématiques hors du champ informatique. Mots-clés : environnement...
Research Proposal
Full-text available
The current study aims to examine a general overview of the application of hash functions in cryptography and study the relationships between cryptographic hash functions and uses of the digital signature. Functions of the cryptographic hash are an important tool applied in several sections of data security, and application of hash function is comm...
Article
Full-text available
In this paper, a comprehensive overview of the Crow Search Algorithm (CSA) is introduced with detailed discussions, which is intended to keep researchers interested in swarm intelligence algorithms and optimization problems. CSA is a new swarm intelligence algorithm recently developed, which simulates crow behavior in storing excess food and retrie...
Presentation
Full-text available
This PDF document presents the fundamental aspects of design and analysis of algorithms. It covers, definition of algorithm, example algorithms, steps of algorithmic problem solving, important problem types and data structures. This document is intended for students of computer science ( at various levels , UG/PG/Diploma), and information science a...
Presentation
Full-text available
Some Academic Recommendation for searching and publishing in top-ranked Venues (in Computer Science). presented by Abdullah Alsaedi & Tawfeeq Alsanoosy
Article
Full-text available
Existen diversos métodos y herramientas para la evaluación de la calidad web que se han propuesto durante los últimos a?os. Son instrumentos que tienen su origen tanto en el contexto académico como profesional. Algunos son de carácter generalista y permiten evaluar cualquier tipo de sitio web, mientras que otros están especializados en sectores esp...
Chapter
Full-text available
Ao longo da história, a educa??o passou por várias modifica??es e muitas delas intersectam o avan?o das tecnologias. Nesse percurso, o educador passou de detentor a mediador do conhecimento e, daí, a professor de navega??o. O conhecimento está na nuvem. S?o barcos movidos a vento que nos levam onde se oculta o que queremos conhecer. Assim com a pan...
Presentation
Full-text available
Complete Preparation of PPSC Lecturer Computer Science (Operating Systems) Part-1
Article
Full-text available
Software engineering is a social and collaborative activity. Communicating and sharing knowledge between software developers requires much effort. Hence, the quality of communication plays an important role in influencing project success. To better understand the effect of communication on project success, more in-depth empirical studies investigat...
Conference Paper
Full-text available
This paper presents and demonstrates a``Computational Design Sustainability'' (CDS) framework, inspired by``Computational Sustainability'' (CS), which is a new area in computational research (C. Gomes & Yang, 2011). CS aims to apply techniques from computer science to address sustainability problems affecting a wide range of fields from environment...
Book
Full-text available
Ce polycopié est un cours détaillé sur le programme officiel du module d'Analyse 3, destiné principalement aux étudiants en deuxième année licence mathématiques dans le cadre du système L.M.D., mais peut éventuellement être utile pour les étudiants en deuxième année licence mathématiques appliquées, sciences techniques, informatique, et les étudian...
Preprint
Full-text available
Artificial intelligence (AI) has been used in various areas to support system optimization and find solutions where the complexity makes it challenging to use algorithmic and heuristics. Case-based Reasoning (CBR) is an AI technique intensively exploited in domains like management, medicine, design, construction, retail and smart grid. CBR is a tec...
Conference Paper
Full-text available
De nos jours, la majorité des applications informatiques utilisent la géolocalisation des objets, des personnes et des événements. Plusieurs secteurs comme l'aménagement du territoire, le transport, la santé, l'éducation,... font appel à ce genre d'application et souhaitent regrouper leurs points d'Intérêt (POI) sur le même référentiel. Pour répond...
Article
Full-text available
Artificial intelligence (AI) has been used in various areas to support system optimization and find solutions where the complexity makes it challenging to use algorithmic and heuristics. Case-based Reasoning (CBR) is an AI technique intensively exploited in domains like management, medicine, design, construction, retail and smart grid. CBR is a tec...
Conference Paper
Full-text available
Teaching machine learning in fields outside of computer sciences can be challenging when the students do not have a solid code knowledge. In this work, the requirements for teaching data literacy and code literacy to students of logistics are explored. Specifically, the use of Jupyter Notebooks in a machine learning course for students in logistics...
Conference Paper
Full-text available
Computer programming is an area in which fresh students have many difficulties, mainly because it is a demanding area in terms of cognitive process and most of the fresh students have little or no notion of Computer Science. In the Introductory Programming course in a Brazilian university, the procedural programming paradigm is used with the C ++ p...
Poster
Full-text available
This journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, robotics, telecommunication, computer engineering, computer science, information system, information technology and informatics from the global world. BEEI is published by Universitas Ahmad Dahlan in Indonesia in coll...
Conference Paper
Full-text available
A transforma??o digital envolve mudan?as tecnológicas, mudan?a cultural e na forma como as organiza??es trabalham e entregam valor, sendo necessário repensar as estratégias organizacionais e assumir novos riscos. Essas mudan?as acontecem e s?o necessárias nos mais diversos ramos da sociedade e, o gerenciamento de projetos, ajuda a mudar a dinamica...
Conference Paper
Full-text available
In this article we describe Augmented Reality (AR) cards for computer science education that were created in the PCBuildAR project. From a technological point of view, we use marker-based AR for the cards so that students can learn and practice at any time with their smartphones. The instructional approach is based on the components content, constr...
Article
Full-text available
Since "chemistry" has become the central core molecular science for energy, environment, sustainability, materials, biology, and medicine, great challenges in "organic chemistry" reflect more or less the same trend. In addition, advances in computing capacity and capabilities have opened avenues for big data treatment and analysis, systems chemistr...