Academic literature on the topic '280000 Information, Computing and Communication Sciences'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic '280000 Information, Computing and Communication Sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "280000 Information, Computing and Communication Sciences"

1

Ploch, Donald R. "Computing: Communication and Control." Social Science Computer Review 8, no. 4 (December 1990): 614–26. http://dx.doi.org/10.1177/089443939000800412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petry, Frederick E., and Ronald R. Yager. "Soft Computing Approaches for Human-Autonomous Agent Communication." International Journal of Intelligent Information Technologies 8, no. 4 (October 2012): 1–12. http://dx.doi.org/10.4018/jiit.2012100101.

Full text
Abstract:
This paper describes soft computing approaches for human-agent communications in the context of influencing decision making behavior. Several methods are illustrated including using a person’s predispositions and generalization techniques that allow issues to be viewed in a more favorable light with social interaction persuasion tendencies modeled with soft computing. The context of a robotic assistant for the elderly is used to illustrate the various communication techniques. Finally the related topic of negotiations using some the developed techniques is presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Wasike, Jotham Milimo, and Lawrence Njoroge. "Opening libraries to cloud computing: a Kenyan perspective." Library Hi Tech News 32, no. 3 (May 5, 2015): 21–24. http://dx.doi.org/10.1108/lhtn-09-2014-0072.

Full text
Abstract:
Purpose – This paper aims to examine the types of cloud computing, models, characteristics, descriptions, applications, considerations for use and benefits of the following technologies to library users. Cloud computing has taken libraries in Kenya by storm. Because of this, many libraries do not know what to do. They are at cross-roads. They lack policies to govern them. However, the recent realization by information professionals that cloud computing has a critical role to play in the provision of information services has created a desire to effectively harness and manage them for scholarly communication. Design/methodology/approach – The research reviewed previous studies on the topic by examining both electronic and print information resources available in the libraries and internet. Findings – The findings revealed that libraries in Kenya are yet to fully embrace cloud computing in their operations. There are mixed feelings by librarians on the degree at which they should integrate these technologies in their service provisions. However, there is a positive progress toward this noble venture. Research limitations/implications – Kenya as a developing nation has limited local content on the subject. The study established that some of the available literature is restricted by intellectual property rights. This forced the researcher to rely heavily on foreign literature for the study. Practical implications – Appreciation of emerging cloud computing technologies by libraries is inevitable for the sustainability and management of modern libraries. Cloud computing makes libraries more competitive by adequately meeting user’s technological needs. This study will also act as a benchmark for the Government of Kenya to improve the current information communication technology (ICT) national policy. Social implications – Apart from revolutionalizing library operations and delivery of services, cloud computing will tremendously revolutionize the social-cultural and communication landscape of the society. Originality/value – The paper provides vital information and insights into how libraries are embracing cloud computing in the provision and dissemination of varied information services to library users.
APA, Harvard, Vancouver, ISO, and other styles
4

Varma, Roli. "DECODING THE FEMALE EXODUS FROM COMPUTING EDUCATION." Information, Communication & Society 10, no. 2 (April 2007): 181–93. http://dx.doi.org/10.1080/13691180701307396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hassan, Mohammad R., Feras A. Alnaimait, Qasem Kharma, Ashraf Sharah, and Khalil H. Al-Shqeerat. "Secure Group Key Management Protocol for Grid Computing." Webology 18, no. 2 (December 23, 2021): 1055–65. http://dx.doi.org/10.14704/web/v18i2/web18374.

Full text
Abstract:
In any multi–device / party systems supporting GRID and cloud-based applications, an essential constraint of these systems is the need of all tools and participants to interconnect with each other as members of a group in a secure approach. Group key management method is an essential functional element for any protected distributed communication setting. Key distribution method is a crucial factor in securing communication in grid computing. After the secure key management is executed, messages will be able to be securely exchanged between the grid units. A number of protocols have been proposed to maintain secure group key management. In this paper we present a new password base protocol for secure group key management in Grid computing environment, which is organized in two dynamic servicing layers: the grid application that needs grid services, and the grid services that act on behalf of the user.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yingxu. "On the Mathematical Theories and Cognitive Foundations of Information." International Journal of Cognitive Informatics and Natural Intelligence 9, no. 3 (July 2015): 42–64. http://dx.doi.org/10.4018/ijcini.2015070103.

Full text
Abstract:
A recent discovery in computer and software sciences is that information in general is a deterministic abstract quantity rather than a probability-based property of the nature. Information is a general form of abstract objects represented by symbolical, mathematical, communication, computing, and cognitive systems. Therefore, information science is one of the contemporary scientific disciplines collectively known as abstract sciences such as system, information, cybernetics, cognition, knowledge, and intelligence sciences. This paper presents the cognitive foundations, mathematical models, and formal properties of information towards an extended theory of information science. From this point of view, information is classified into the categories of classic, computational, and cognitive information in the contexts of communication, computation, and cognition, respectively. Based on the three generations of information theories, a coherent framework of contemporary information is introduced, which reveals the nature of information and the fundamental principles of information science and engineering.
APA, Harvard, Vancouver, ISO, and other styles
7

Makori, Elisha Ondieki. "Exploration of cloud computing practices in university libraries in Kenya." Library Hi Tech News 33, no. 9 (November 7, 2016): 16–22. http://dx.doi.org/10.1108/lhtn-11-2015-0077.

Full text
Abstract:
Purpose Modern technological solutions are rapidly changing the information landscape in library and information establishments. One such innovative solution that is gaining momentum in information centers is cloud computing. The purpose of this paper is to explore and compare opportunities and challenges of “cloud computing paradigm” in handling and supporting delivery of information services in university libraries in the face of the present hard economic situation and limited financial budgets. Design/methodology/approach The study is based on current academic literature, document analysis, several editorials and articles on the potential and challenges of cloud computing paradigm in university library and information centers. Findings Cloud computing is proving as the best management practice of salvaging information services in university libraries due to numerous competing challenges and issues in institutions of higher education. University libraries in developing countries face many challenges of inadequate information infrastructure, limited financial budgets, manpower issues and rapid changes in technological systems. In the context of hard economic times, cloud computing is critical in adding value as well as advancing the goals and objectives of modern university libraries. Cloud computing is the “best technology practice” that is poised to play crucial roles in enhancing quality provision and delivery of information services in university library and information centers. There are many competing challenges and claims, but potential benefits count more. Research limitations/implications The study is based on the ideas of cloud services conceptualized from reading academic literature, document analysis, several editorials, articles and professional work experience. The paper identifies that cloud computing paradigm is useful in achieving the goals and objectives of university libraries in this hard economic situation facing institutions of higher learning. Practical implications The paper provides practical insights that cloud computing is the “must have technology” for modern university library and information centers already burdened with the demand to develop effective and efficient technological solutions due to subsequent changing needs of the digital information environment. This study is useful for university libraries, information professionals, information communication technology professionals and university management. Social implications Cloud computing paradigm provides university libraries with the business opportunity to use comprehensive technological solutions with reduced capital expenditure and safe methods of data storage. This eases the inconveniences normally caused by the need to develop and own such comprehensive technological solutions. Originality/value This research looks at the potential of the emerging trend of “cloud computing paradigm” in enhancing quality provision and delivery of information services in university library and information centers in the context of limited financial budgets. Cloud computing has been gaining momentum in Kenya, especially in business organizations as compared to library and information establishments.
APA, Harvard, Vancouver, ISO, and other styles
8

Saoud, Afaf, and A. RECIOUI. "review on Data communication in smart grids." Algerian Journal of Signals and Systems 2, no. 3 (September 15, 2017): 162–79. http://dx.doi.org/10.51485/ajss.v2i3.42.

Full text
Abstract:
Smart Grids require a complex two-way communication infrastructure, sustaining power flows between intelligent components, and sophisticated computing and information technologies, as well as business applications. Data will flow over generation, transmission, distribution, and user networks in the SG. The amount of data generated by smart devices will experience explosive growth in the future. This tremendous data amount places considerable load on the communications infrastructure of the SG. This paper highlights a review on the smart grid focusing on the communication infrastructure and the data issues. A scan of the most contributions relevant to the topic is presented. The key opportunities and challenges of the communication part of the smart grid are presented for further research.
APA, Harvard, Vancouver, ISO, and other styles
9

Sarwar, Musavarah, and Muhammad Akram. "Certain Algorithms for Computing Strength of Competition in Bipolar Fuzzy Graphs." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 25, no. 06 (November 17, 2017): 877–96. http://dx.doi.org/10.1142/s0218488517500374.

Full text
Abstract:
Fuzzy graph theory is one of the most developing area of research, which has a variety of applications in different fields, including computer science, communication networks, biological sciences, social networks, decision-making and optimization problems. A wide variety of human decision making is based on double-sided or bipolar judgmental thinking on a positive side and a negative side. In this research article, we present some interesting applications of bipolar fuzzy competition graphs in business marketing, social network and wireless communication network. We design and implement algorithms for computing the strength of competition in the bipolar fuzzy graphs. We also compute time complexity of each algorithm.
APA, Harvard, Vancouver, ISO, and other styles
10

Allmann, Kira, and Grant Blank. "Rethinking digital skills in the era of compulsory computing: methods, measurement, policy and theory." Information, Communication & Society 24, no. 5 (February 21, 2021): 633–48. http://dx.doi.org/10.1080/1369118x.2021.1874475.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "280000 Information, Computing and Communication Sciences"

1

Mugridge, Warwick Bruce. "Enhancements to an object-oriented programming language." Thesis, University of Auckland, 1990. http://hdl.handle.net/2292/1997.

Full text
Abstract:
The objective of this thesis has been to explore the value and limitations of Class, an object-oriented programming language, in order to further the development of the language. The pivot for this thesis is WallBrace, a code-checking system. The development of the WallBrace system is the basis of a critique of Class, and leads to a number of language extensions being proposed. An important aim in this work has been the careful integration of these enhancements with the rest of the language, avoiding unnecessary additions. A number of functional and object-oriented extensions to the language are proposed. Discrimination functions, which may be higher-order and polymorphic, add considerable functional power. Generic classes allow for abstract data types, such as sets and lists, to be defined within the language. The forms interface proposed will greatly enhance the quality of user interfaces to Class programs. An external interface will allow Class programs to communicate with files, databases, and specialist user-interface programs, such as for plan entry.
APA, Harvard, Vancouver, ISO, and other styles
2

Sluti, Donald George. "Linking process quality with performance: an empirical study of New Zealand manufacturing plants." Thesis, University of Auckland, 1992. http://hdl.handle.net/2292/2028.

Full text
Abstract:
This study was conducted to assess the impacts of quality on operational and business performance in manufacturing firms. Data were provided by 184 diversified New Zealand manufacturing plants- Quality is defined as the degree of conformance to specifications. The first phase of the research was the construction of a theoretical model to incorporate the impacts of quality on manufacturing performance, manufacturing productivity and business performance. The relationships of the model are based on the quality management literature. The second phase of the research was the design and administration of a survey instrument for the collection of empirical performance data. The data were then used to evaluate the relationships represented in the model. The final phase of the research used structural equations modelling in order to evaluate the relationships of the model. Quality was found to have significant and positive impacts on operational performance measures for process utilization, process output, production costs, work-in-process inventory levels and on-time delivery rate. The analysis found that change in quality level was most strongly associated with change in process utilization. The findings for the impacts of quality on operational performance were compatible with the quality management literature. The impacts of quality on business performance given by structural equations analysis were significant and positive for productivity-induced improvements of quality. Generally, the support for the impacts of quality on business performance which occur through other aspects of, operational performance was not significant. The limitations of the study were specified. The implications of the findings of the study for manufacturers were reviewed, along with the directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
3

Gutmann, Peter. "The Design and Verification of a Cryptographic Security Architecture." Thesis, University of Auckland, 2000. http://hdl.handle.net/2292/2310.

Full text
Abstract:
A cryptographic security architecture constitutes the collection of hardware and software which protects and controls the use of encryption keys and similar cryptovariables. This thesis presents a design for a portable, flexible high-security architecture based on a traditional computer security model. Behind the API it consists of a kernel implementing a reference monitor which controls access to security-relevant objects and attributes based on a configurable security policy. Layered over the kernel are various objects which abstract core functionality such as encryption and digital signature capabilities, certificate management and secure sessions and data enveloping (email encryption). The kernel itself uses a novel design which bases its security policy on a collection of filter rules enforcing a cryptographic module-specific security policy. Since the enforcement mechanism (&e kernel) is completely independent of the policy database (the filter rules), it is possible to change the behaviour of the architecture by updating the policy database without having to make any changes to the kernel itself. This clear separation of policy and mechanism contrasts with current cryptographic security architecture approaches which, if they enforce controls at all, hardcode them into the implementation, making it difficult to either change the controls to meet application-specific requirements or to assess and verify them. To provide assurance of the correctness of the implementation, this thesis presents a design and implementation process which has been selected to allow the implementation to be verified in a manner which can reassure an outsider that it does indeed function as required. In addition to producing verification evidence which is understandable to the average user, the verification process for an implementation needs to be fully automated and capable of being taken down to the level of running code, an approach which is currently impossible with traditional methods. The approach presented here makes it possible to perform verification at this level, something which had previously been classed as "beyond Al" (that is, not achievable using any known technology). The versatility of the architecture presented here has been proven through its use in implementations ranging from l6-bit microcontrollers through to supercomputers, as well as a number of unusual areas such as security modules in ATMs and cryptographic coprocessors for general-purpose computers.
Note: Updated version of the thesis now published as Gutmann, P (2004). Cryptographic security architecture: design and verification. New York: Springer. ISBN 9780387953876.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Lei. "Effectiveness of text-based mobile learning applications: case studies in tertiary education : a thesis presented to the academic faculty, submitted in partial fulfilment of the requirements for the degree of Master of Information Sciences in Information Technology, Massey University." Massey University, 2009. http://hdl.handle.net/10179/1092.

Full text
Abstract:
This research focuses on developing a series of mobile learning applications for future 'beyond' classroom learning environments. The thesis describes the general use pattern of the prototype and explores the key factors that could affect users‘ attitudes towards potential acceptance of the mobile learning applications. Finally, this thesis explores the user acceptance of the mobile learning applications; and investigates the mobility issue and the comparison of applying learning activities through mobile learning and e-learning.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Chun Chieh. "Evaluating online support for mobile phone selection : using properties and performance criteria to reduce information overload : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Auckland, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/844.

Full text
Abstract:
The mobile phone has been regarded as one of the most significant inventions in the field of communications and information technology over the past decade. Due to the rapid growth of mobile phone subscribers, hundreds of phone models have been introduced. Therefore, customers may find it difficult to select the most appropriate mobile phone because of information overload. The aim of this study is to investigate web support for customers who are selecting a mobile phone. Firstly, all the models of mobile phones in the New Zealand market were identified by visiting shops and local websites. Secondly, a list of all the features of these mobile phones was collated from local shops, websites and magazines. This list was categorised into mobile phone properties and performance criteria. An experiment then compared three different selection support methods: A (mobile phone catalogue), B (mobile phone property selection) and C (mobile phone property and performance criteria selection). The results of the experiment revealed that selection support methods B and C had higher overall satisfaction ratings than selection support method A; both methods B and C had similar satisfaction ratings. The results also suggested that males and females select their mobile phones differently, though there was no gender preference in selection support methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Thompson, Errol Lindsay. "How do they understand? Practitioner perceptions of an object-oriented program : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Education (Computer Science) at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/854.

Full text
Abstract:
In the computer science community, there is considerable debate about the appropriate sequence for introducing object-oriented concepts to novice programmers. Research into novice programming has struggled to identify the critical aspects that would provide a consistently successful approach to teaching introductory object-oriented programming. Starting from the premise that the conceptions of a task determine the type of output from the task, assisting novice programmers to become aware of what the required output should be, may lay a foundation for improving learning. This study adopted a phenomenographic approach. Thirty one practitioners were interviewed about the ways in which they experience object-oriented programming and categories of description and critical aspects were identified. These critical aspects were then used to examine the spaces of learning provided in twenty introductory textbooks. The study uncovered critical aspects that related to the way that practitioners expressed their understanding of an object-oriented program and the influences on their approach to designing programs. The study of the textbooks revealed a large variability in the cover of these critical aspects.
APA, Harvard, Vancouver, ISO, and other styles
7

Senjov-Makohon, Natalie. "Digital immigrant teachers learning for the information age." full-text, 2009. http://eprints.vu.edu.au/2063/1/senjov_makohon.pdf.

Full text
Abstract:
This study investigated how experienced teachers learned Information and Communication Technologies (ICT) during their professional development. With the introduction of ICT, experienced teachers encountered change becoming virtually displaced persons – digital immigrants; new settlers – endeavouring to obtain digital citizenship in order to survive in the information age. In the process, these teachers moved from learning how to push buttons, to applying software, and finally to changing their practice. They learned collectively and individually, in communities and networks, like immigrants and adult learners: by doing, experimenting and reflecting on ICT. Unfortunately, for these teachers-as-pedagogues, their focus on pedagogical theory during the action research they conducted, was not fully investigated or embraced during the year-long study. This study used a participant observation qualitative methodology to follow teachers in their university classroom. Interviews were conducted and documentation collected and verified by the teacher educator. The application of Kolb‘s, Gardner‘s, and Vygotsky‘s work allowed for the observation of these teachers within their sociocultural contexts. Kolb‘s work helped to understand their learning processes and Gardner‘s work indicated the learning abilities that these teachers valued in the new ICT environment. Meanwhile Vygotsky‘s work – and in particular three concepts, uchit, perezhivanija, and mislenija – presented a richer and more informed basis to understand immigration and change. Finally, this research proposes that teachers learn ICT through what is termed a hyperuchit model, consisting of developments; action; interaction; and reflection. The recommendation is that future teacher university ICT professional learning incorporates this hyperuchit model.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yang. "An empirical study on the relationship between identity-checking steps and perceived trustworthiness in online banking system use : submitted in partial fulfilment of the requirements for the Degree of Master of Information Sciences in Information Technology." Massey University, 2009. http://hdl.handle.net/10179/982.

Full text
Abstract:
Online banking systems have become more common and widely used in daily life, bringing huge changes in modern banking transaction activities and giving us a greater opportunity to access the banking system anytime and anywhere. At the same time, however, one of the key challenges that still remain is to fully resolve the security concerns associated with the online banking system. Many clients feel that online banking is not secure enough, and to increase its security levels, many banks simply add more identity-checking steps or put on more security measures to some extent to give users the impression of a secure online banking system. However, this is easier to be said than done, because we believe that more identity-checking steps could compromise the usability of the online banking system, which is an inevitable feature in design of usable and useful online banking systems. Banks can simply enhance their security level with more sophisticated technologies, but this does not seem to guarantee the online banking system is in line with its key usability concern. Therefore, the research question raised in this thesis is to establish the relationships between usability, security and trustworthiness in the online banking system. To demonstrate these relationships, three experiments were carried out using the simulation of an online banking logon procedure to provide a similar online banking experience. Post questionnaires were used to measure the three concepts, i.e. usability, security and trustworthiness. The resulting analyses revealed that simply adding more identity-checking steps in the online banking system did not improve the customers? perceived security and trustworthiness, nor the biometric security technique (i.e., fingerprints) did enhance the subjective ratings on the perceived security and trustworthiness. This showed that the systems designer needs to be aware that the customer?s perception of the online banking system is not the same as that conceived from a technical standpoint.
APA, Harvard, Vancouver, ISO, and other styles
9

Mohanarajah, Selvarajah. "Designing CBL systems for complex domains using problem transformation and fuzzy logic : a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at Massey University, Palmerston North, New Zealand." Massey University, 2007. http://hdl.handle.net/10179/743.

Full text
Abstract:
Some disciplines are inherently complex and challenging to learn. This research attempts to design an instructional strategy for CBL systems to simplify learning certain complex domains. Firstly, problem transformation, a constructionist instructional technique, is used to promote active learning by encouraging students to construct more complex artefacts based on less complex ones. Scaffolding is used at the initial learning stages to alleviate the difficulty associated with complex transformation processes. The proposed instructional strategy brings various techniques together to enhance the learning experience. A functional prototype is implemented with Object-Z as the exemplar subject. Both objective and subjective evaluations using the prototype indicate that the proposed CBL system has a statistically significant impact on learning a complex domain. CBL systems include Learner models to provide adaptable support tailored to individual learners. Bayesian theory is used in general to manage uncertainty in Learner models. In this research, a fuzzy logic based locally intelligent Learner model is utilized. The fuzzy model is simple to design and implement, and easy to understand and explain, as well as efficient. Bayesian theory is used to complement the fuzzy model. Evaluation shows that the accuracy of the proposed Learner model is statistically significant. Further, opening Learner model reduces uncertainty, and the fuzzy rules are simple and resemble human reasoning processes. Therefore, it is argued that opening a fuzzy Learner model is both easy and effective. Scaffolding requires formative assessments. In this research, a confidence based multiple test marking scheme is proposed as traditional schemes are not suitable for measuring partial knowledge. Subjective evaluation confirms that the proposed schema is effective. Finally, a step-by-step methodology to transform simple UML class diagrams to Object-Z schemas is designed in order to implement problem transformation. This methodology could be extended to implement a semi-automated translation system for UML to Object Models.
APA, Harvard, Vancouver, ISO, and other styles
10

Ashwell, Douglas James. "Reflecting diversity or selecting viewpoints : an analysis of the GM debate in New Zealand's media 1998-2002 : a thesis presented in partial fulfilment of the requirements for the degree of PhD in Communication at Massey University, Palmerston North, New Zealand." Massey University, 2009. http://hdl.handle.net/10179/1200.

Full text
Abstract:
The advent of genetically modified (GM) food in New Zealand in 1998 saw the beginning of a highly politicised debate about GM use in the country. The concern over GM and the political situation after the 1999 general election saw the Government establish a Royal Commission of Inquiry on Genetic Modification in May, 2000. The Royal Commission and strong public opposition to GM, evident in large public protests and other actions, made the issue highly newsworthy. The aim of this study was to explore how newspapers reported the GM debate, in particular, examining whether the reportage facilitated greater public debate and awareness about GM through journalists adhering to the ideals of the theory of social responsibility and enacting their watchdog role as encapsulated in the Fourth Estate tradition of the media. To achieve these aims the overall tone of the reportage and also which news source types and themes were most frequently reported were examined. In addition, the relationship and perceptions of scientists and journalists involved in the reporting were explored to examine how these relationships may have influenced the reportage. Content analysis showed the reportage had a pro-GM bias with policy-makers, scientists and industry spokespeople the most frequently cited news sources. The themes of Science, Economics and Politics dominated the reportage. Other source types and themes were less represented, especially themes dealing with ethical and environmental arguments. This lack of representation occurred despite the Royal Commission offering a space for all interested parties to speak. The interviews illustrated that scientists believed the quality of newspaper coverage of GM lacked depth and that important issues were unreported. Journalists found the issue complex to report and said they took care not to oversimplify the science and issues surrounding GM. The relationship between scientists and journalists indicated particular tensions existing between the two groups. The thesis concludes that if robust public debate is to occur within New Zealand regarding GM and other scientific developments, then the media should reflect a greater diversity of opinion by citing other potential news sources offering alternative arguments based on, for example, ethical or environmental grounds.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "280000 Information, Computing and Communication Sciences"

1

Aykanat, Cevdet, and Tug rul Dayar. Computer and information sciences: ISCIS 2004, 19th international symposium, Kemer-Antalya, Turkey, October 27-29, 2004 : proceedings. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Greenberg, Ariel M. Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Akihiko, Konagaya, Satou Kenji, and LSGRID 2004 (1st : 2004 : Kanazawa, Japan), eds. Grid computing in life science: First International Workshop on Life Science Grid, LSGRID 2004, Kanazawa, Japan, May 31 - June 1, 2004 ; revised selected and invited papers. Berlin: Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Werner, Schmidt, Stary Christian, Obermeier Stefan, Börger Egon, and SpringerLink (Online service), eds. Subject-Oriented Business Process Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Louis, Rosenfeld. The Internet compendium: Subject guides to social sciences, business and law resources. London: Mansell, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joseph, Janes, and Vander Kolk Martha, eds. The internet compendium: Subject guides to social sciences, business, and law resources. New York: Neal-Schuman Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Louis, Rosenfeld. The Internet compendium: Subject guides to humanities resources. London: Mansell, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Louis, Rosenfeld. The Internet compendium: Subject guides to health and science resources. London: Mansell, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Joseph, Janes, and Vander Kolk Martha, eds. The Internet compendium: Subject guides to health and science resources. New York: Neal-Schuman Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Henry, Millsom. IT in the Social Sciences: A Student's Guide to the Information and Communication Technologies (Infosource Computing for Students). Blackwell Publishing, Incorporated, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "280000 Information, Computing and Communication Sciences"

1

Abdali, S. Kamal. "High Performance Computing and Communication Research at the National Science Foundation." In Lecture Notes in Control and Information Sciences, 5–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3540761691_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saxena, Rahul, Mahipal Jadeja, and Atul Kumar Verma. "Efficient Information Flow Based on Graphical Network Characteristics." In Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences, 515–26. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-7533-4_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Feixas, Miquel, and Mateu Sbert. "The Role of the Information Channel in Visual Computing." In Advances in Info-Metrics, 464–90. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190636685.003.0017.

Full text
Abstract:
Around seventy years ago, Claude Shannon, who was working at Bell Laboratories, introduced information theory with the main purpose of dealing with the communication channel between source and receiver. The communication channel, or information channel as it later became known, establishes the shared information between the source or input and the receiver or output, both of which are represented by random variables, that is, by probability distributions over their possible states. The generality and flexibility of the information channel concept can be robustly applied to numerous, different areas of science and technology, even the social sciences. In this chapter, we will present examples of its application to select the best viewpoints of an object, to segment an image, and to compute the global illumination of a three-dimensional virtual scene. We hope that our examples will illustrate how the practitioners of different disciplines can use it for the purpose of organizing and understanding the interplay of information between the corresponding source and receiver.
APA, Harvard, Vancouver, ISO, and other styles
4

Simpson, Michael L., and Timothy E. McKnight. "The Biology of Integration of Cells into Microscale and Nanoscale Systems." In Cellular Computing. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195155396.003.0013.

Full text
Abstract:
In chapter 5 we focused on the informational interface between cells and synthetic components of systems. This interface is concerned with facilitating and manipulating information transport and processing between and within the synthetic and whole-cell components of these hybrid systems. However, there is also a structural interface between these components that is concerned with the physical placement, entrapment, and maintenance of the cells in a manner that enables the informational interface to operate. In this chapter we focus on this structural interface. Successful integration of whole-cell matrices into microscale and nanoscale elements requires a unique environment that fosters continued cell viability while promoting, or at least not blocking, the information transport and communication pathways described in earlier chapters. A century of cell culture has provided a wealth of insight and specific protocols to maintain the viability and (typically) proliferation of virtually every type of organism that can be propagated. More recently, the demands for more efficient bioreactors, more compatible biomedical implants, and the promise of engineered tissues has driven advances in surface-modification sciences, cellular immobilization, and scaffolding that provide structure and control over cell growth, in addition to their basic metabolic requirements. In turn, hybrid biological and electronic systems have emerged, capable of transducing the often highly sensitive and specific responses of cellular matrices for biosensing in environmental, medical, and industrial applications. The demands of these systems have driven advances in cellular immobilization and encapsulation techniques, enabling improved interaction of the biological matrix with its environment while providing nutrient and respiratory requirements for prolonged viability of the living matrices. Predominantly, such devices feature a single interface between the bulk biomatrix and transducer. However, advances in lithography, micromachining, and micro-/nanoscale synthesis provide broader opportunities for interfacing whole-cell matrices with synthetic elements. Advances in engineered, patterned, or directed cell growth are now providing spatial and temporal control over cellular integration within microscale and nanoscale systems. Perhaps the best defined integration of cellular matrices with electronically active substrates has been accomplished with neuronal patterning. Topographical and physicochemical patterning of surfaces promotes the attachment and directed growth of neurites over electrically active substrates that are used to both stimulate and observe excitable cellular activity.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "280000 Information, Computing and Communication Sciences"

1

Ghani, Nehan Abdul, Yumna Shahid, Zahra Mubeen, Mahnoor Khursheed, Sundus Ali, and Muhammad Imran Aslam. "Prototype Implementation of Device-to-Device Communication." In 2021 4th International Conference on Computing & Information Sciences (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis54243.2021.9676389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Cloud Computing in Application of University Information Construction." In 2018 1st International Conference on Engineering, Communication and Computer Sciences. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/iceccs.2018.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aslam, Tahniyat, Irfan Ahmed, Sundus Ali, and Muhammad Imran Aslam. "TeraHertz Communication and Associated Challenges in 6G Cellular Networks." In 2021 4th International Conference on Computing & Information Sciences (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis54243.2021.9676382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hassan, Usman, Hamza Ahmed Khan, Hamdah Khan, and Muhammad Owais. "Communication System For Non-Verbal Paralyzed Patients Using Computer Vision." In 2021 4th International Conference on Computing & Information Sciences (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis54243.2021.9676383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ling, Yun, Zhenshan Luo, and Yujia Ge. "Fault-tolerant scheduling algorithm for precedence constrained tasks in grid computing systems with communication efficiency." In 2010 3rd International Conference on Information Sciences and Interaction Sciences (ICIS). IEEE, 2010. http://dx.doi.org/10.1109/icicis.2010.5534743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baig, Muhammad Sawood, Faisal Ahmed, and Ali Mobin Memon. "Spear-Phishing campaigns: Link Vulnerability leads to phishing attacks, Spear-Phishing electronic/UAV communication-scam targeted." In 2021 4th International Conference on Computing & Information Sciences (ICCIS). IEEE, 2021. http://dx.doi.org/10.1109/iccis54243.2021.9676394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Innovation of Network Information Security Technology under the Background of Cloud Computing Technology." In 2018 1st International Conference on Engineering, Communication and Computer Sciences. Clausius Scientific Press, 2018. http://dx.doi.org/10.23977/iceccs.2018.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brezany, Peter, Thomas Ludescher, and Thomas Feilhauer. "Cloud-Dew computing support for automatic data analysis in life sciences." In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2017. http://dx.doi.org/10.23919/mipro.2017.7973450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Koval, Valerii, Vitaliy Lysenko, Sergey Shvorov, Vyacheslav Vakas, Vadym Yarmoliuk, Oleksandr Osinskiy, Igor Shkliarevskyi, Taras Semeniv, and Olexander Samkov. "Computing tools in a synchronization signals monitoring system for mobile communication and SMART technologies based networks." In 2022 IEEE 17th International Conference on Computer Sciences and Information Technologies (CSIT). IEEE, 2022. http://dx.doi.org/10.1109/csit56902.2022.10000732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Delija, Damir, Goran Sirovatka, Domagoj Tulicic, and Marinko Zagar. "Comparison of Graduate Specialist Study of Computing and Specialist Study of Information Security and Digital Forensics at the Zagreb University of Applied Sciences." In 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2019. http://dx.doi.org/10.23919/mipro.2019.8756891.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "280000 Information, Computing and Communication Sciences"

1

Tkachuk, Viktoriia V., Vadym P. Shchokin, and Vitaliy V. Tron. The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy. [б. в.], November 2018. http://dx.doi.org/10.31812/123456789/2668.

Full text
Abstract:
Research goal: the research is aimed at developing a model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Object of research is the model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Results of the research: the developed model of use of mobile ICT as tools of learning Computer Sciences to future professionals in Engineering Pedagogy is based on the competency-based, person-centered and systemic approaches considering principles of vocational education, general didactic principles, principles of Computer Science learning, and principles of mobile learning. It also takes into account current conditions and trends of mobile ICT development. The model comprises four blocks: the purpose-oriented block, the content-technological block, the diagnostic block and the result-oriented block. According to the model, the learning content of Computer Sciences consists of 5 main units: 1) Fundamentals of Computer Science; 2) Architecture of Modern Computers; 3) Fundamentals of Algorithmization and Programming; 4) Software of Computing Systems; 5) Computer Technologies in the Professional Activity of Engineer-pedagogues.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography