Journal articles on the topic 'Other computer and information sciences'

To see the other types of publications on this topic, follow the link: Other computer and information sciences.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Other computer and information sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jiang, Zi Li. "Study of Computer Key Technologies and Mobile Technology." Applied Mechanics and Materials 539 (July 2014): 251–55. http://dx.doi.org/10.4028/www.scientific.net/amm.539.251.

Full text
Abstract:
Human society is in the information age, the information revolution has full rise. Human society changed from the value calculated into a comprehensive problem solving. Human being is gradually put information into a computer system for the process of transplantation, resulting in the need of information management, information engineering, information exchange, and other branches of science. For the rapidly expanding range of problem-solving, the existing computer functions are a serious shortage, lack of intelligence. The lack of intelligence in computer science has been unable to generalize the entire contents of the information science. This paper mainly explains the development and application of computers in mobile technology.
APA, Harvard, Vancouver, ISO, and other styles
2

Ming, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.

Full text
Abstract:
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
APA, Harvard, Vancouver, ISO, and other styles
3

Fernandes, Wesley Rodrigo, Beatriz Valadares Cendón, and Carlos Alberto Ávila Araújo. "Information Science and its correlated areas:." Brazilian Journal of Information Science 5, no. 1 (December 3, 2011): 3–35. http://dx.doi.org/10.36311/1981-1640.2011.v5n1.02.p3.

Full text
Abstract:
This research contributes to the understanding of what Information Science is and how it is evolving by verifying the disciplines Information Science interacts with at the present time, as well as the breadth and intensity of these relationships. The research uses two bibliometric studies of the scientific journals utilized by researchers in the field. In the first study, citation analysis assessed 433 journals cited in the bibliographies of 18 theses and 39 dissertations from the Graduate Program of Information Science of the Federal University of Minas Gerais. These were first examined to determine their distribution in nine categories representative of large areas of knowledge. Next, subareas to which each journal pertained were also identified. In the second study, 316 journals from the field of Information Science, which the CAPES Portal of Scientific Journals subscribed to, were identified and analyzed in terms of the other areas of knowledge to which they were also designated by the Portal. The results of the citation analysis revealed that 31.8% of 433 journals cited were interdisciplinary, 49.7% pertained to other areas of knowledge while 18.50% were classified solely as Information Science. The analysis of the data from second study revealed that 57% of the journals were classified solely as Information Science and 43% were classified simultaneously in more than one area. Results stemming from both studies show that computer science, administration and education are the disciplines most closely related to Information Science. The areas of knowledge to which Information Science most broadly relates are applied social sciences, human sciences and linguistics, literature and the arts.
APA, Harvard, Vancouver, ISO, and other styles
4

Serebrianska, Irina. "APPLIED LINGUISTICS, COMPUTATIONAL LINGUISTICS AND OTHER INTERDISCIPLINARY SCIENCES AS EFFECTIVE INTERCULTURAL COMMUNICATION STRATEGIES." Fìlologìčnì traktati 13, no. 1 (2021): 78–84. http://dx.doi.org/10.21272/ftrk.2021.13(1)-8.

Full text
Abstract:
The article deals with the issues of interaction of linguistics and modern computer information technologies. It systematizes the actual problems and ways of their integration based on the analysis of the latest scientific works and the appropriate educational programs in higher education institutions all over the world. It draws attention to interdisciplinary sciences such as applied linguistics, computational linguistics, linguistic informatics, quantitative linguistics, mathematical linguistics, Internet linguistics, and integrated knowledge. The cooperation of two different areas is very productive and prospective. It contributes to the development of artificial intelligence and provides wider professional opportunities, effective intercultural communication and further improvement of society. The representatives of two, very different fields become mutually beneficial and complete each other successfully. The result of this interaction is a universal specialist which is in great demand nowadays. The main issues of the interaction of linguistics and modern information technologies are the following: 1) the role of virtual space and modern information technology in the development of linguistics; 2) the role of linguistics in the development of virtual space and information technologies, and the training of computer specialists; 3) the place of virtual space and modern information technologies in preparing linguists and translators (machine translation, translation systems, etc.); 4) the emergence of interdisciplinary sciences and educational courses at the intersection of two areas to provide society with professionals with integrated knowledge; duplication of their conceptual and terminological apparatus and research methods (due to their novelty); methodological support of the integrated educational process.
APA, Harvard, Vancouver, ISO, and other styles
5

Marijuán, Pedro C. "The Advancement of Information Science." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 7, no. 2 (November 18, 2009): 369–75. http://dx.doi.org/10.31269/vol7iss2pp369-375.

Full text
Abstract:
The advancement of a new scientific perspective, information science, devoted to the study of the vast field of informational phenomena in nature and society, implies putting together a number of cognizing domains which are presently scattered away in many other disciplines. Comparable to previous scientific revolutions spurred by thermodynamics and quantum mechanics, it would be time to go beyond the classical discussions on the concept of information, and associated formal theories, and advance a “new way of thinking”. Cells, Brains, Societies, and Quantum information would be crucial arenas for this discussion. Rather than hierarchy, reduction, or unification, the catchword is unending recombination... A mature information science should offer a new panoramic view on the sciences themselves and contribute to achieve social adaptability & sustainability.
APA, Harvard, Vancouver, ISO, and other styles
6

FON-DER-FLAASS, DMITRI, and IVAN RIVAL. "COLLECTING INFORMATION IN GRADED ORDERED SETS." Parallel Processing Letters 03, no. 03 (September 1993): 253–60. http://dx.doi.org/10.1142/s0129626493000290.

Full text
Abstract:
We consider a set of computers with precedence constraints (an ordered set) in which stored information can be passed, serially or in parallel, from one computer to any other which is an immediate successor. When is it possible to organize information transmission so that each computer receives all information from its predecessors, without duplication?
APA, Harvard, Vancouver, ISO, and other styles
7

Demir, Servet. "Welcome to the Journal of Research in Data Science." Journal of Research in Data Science 1, no. 1 (November 15, 2021): 1–2. http://dx.doi.org/10.51853/jorids/11125.

Full text
Abstract:
Data science is defined as the collection of basic principles that support and lead the extraction of information and knowledge from data (Provost & Fawcett, 2013). It is an interdisciplinary field as it requires mathematics, statistics, computer sciences, natural sciences, journalists, sociology, psychology and other disciplines to afford knowledge from data (Igual & Seguí, 2017).
APA, Harvard, Vancouver, ISO, and other styles
8

Medetbayeva, Salima A., and Nurlan K. Akhmetov. "Psychological and Pedagogical Problems of Computer-aided Teaching of Natural Sciences." International Journal of Emerging Technologies in Learning (iJET) 16, no. 20 (October 25, 2021): 208. http://dx.doi.org/10.3991/ijet.v16i20.24427.

Full text
Abstract:
Information has become a global inexhaustible resource for mankind, which has entered a new era in the development of civilisation. Today it is important to improve the quality of education by introducing computer technologies in chemistry classes. The purpose of the study was to develop and present the methodological foundations of the development and implementation of computer technologies in the game teaching of chemistry to improve the teaching methods. To achieve this goal, the corresponding tasks were identified, as well as methods for their solution: the analysis and comparative analysis, modelling. Results of the study: the positive and negative factors of the use of modern computer technologies in chemistry classes were identified; the principles of selecting the content of the material using information and communication technologies in teaching were characterised; the methodical foundations of the application and use of information and communication technologies when teaching chemistry were considered. It was concluded that the use of a computer in the educational process contributes to the improvement of teaching methods more than any other technical means at the teacher's disposal. The introduction of information technologies into the educational process significantly changes and ultimately increases the effectiveness of teaching. The practical significance of the study is conditioned by the fact that the methodical foundations of the use of information technologies in chemistry class presented in the paper can be applied in schools and other educational institutions.
APA, Harvard, Vancouver, ISO, and other styles
9

Rowlett, Russell J. "Abstracts and other information filters." Journal of Chemical Information and Modeling 25, no. 3 (August 1, 1985): 159–63. http://dx.doi.org/10.1021/ci00047a005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chernenko, Varvara. "THE FORMATION OF INFORMATICS COMPETENCY FOR FUTURE COMPUTER SCIENCE TEACHERS IN THE PROCESS OF STUDYING COMPUTER MATHEMATICS." Physical and Mathematical Education 30, no. 4 (September 13, 2021): 6–12. http://dx.doi.org/10.31110/2413-1571-2021-030-4-001.

Full text
Abstract:
Relevance and expediency of introduction of a training course of computer mathematics for students of “Secondary Education (Computer Science)” is caused by necessity of use of computer equipment with the corresponding software almost in all areas of human activity; the fact that computer mathematics is one of priority directions of research work both in the field of mathematical sciences, and in the field of computer science. Computer mathematics is a field of applied computer science in which problems of development, implementation and use of information technologies for solving mathematical problems are studied. The purpose of teaching computer mathematics is to study and use computer mathematics systems by students to solve applied problems; to master the conceptual and terminological base of modern computer science as a fundamental science; to master theoretical fundamentals of computer science related to formal systems, knowledge bases and models of their representation, models and algorithms of decision making. Formulation of the problem. The study of computer mathematics by future computer science teachers and the use of modern systems of computer mathematics to solve applied problems, creates their system of professional competencies, in particular, informatics competencies in computer mathematics, informatics and mathematical competencies and skills to use modern information technology to analyze mathematical models of processes and phenomena from a variety of fields of knowledge and human activities. Materials and methods. To achieve this goal, the following research methods were used: analysis of scientific and pedagogical literature on the research topic; analysis of curricula, work programs and manuals on the subject "Computer Mathematics"; empirical methods (questionnaire, conversation, pedagogical observation, modeling). Results. This paper has built the model of building informatics competence within the professional competence of the future computer science teacher at the expense of integration of mathematical and information knowledge on the basis of mathematical modeling in environments of systems of computer mathematics, as these systems are an effective means of realization of inter-subject connections of computer science with other subjects of a natural-mathematical cycle. Conclusions. The study of "Computer Mathematics" courses by future computer science teachers, using computer mathematics systems, contributes to the formation of components of the information competence system in the field of information, mathematical and computer modeling.
APA, Harvard, Vancouver, ISO, and other styles
11

Yakovleva, Galina V. "Information Sciences in the Schedules of Library Bibliographic Classification." Bibliotekovedenie [Library and Information Science (Russia)] 68, no. 5 (November 27, 2019): 455–64. http://dx.doi.org/10.25281/0869-608x-2019-68-5-455-464.

Full text
Abstract:
Library bibliographic classification (LBC) is the national classification system of Russia. The article briefly covers the history of the LBC and presents the structure and content of new sections of the LBC schedules, reflecting the modern literature on information science, information technology and cybernetics. The author considers specific features of delimitation of literature within the sections and between other divisions of the LBC medium schedules. Cybernetics section gives the most general and modern definition of cybernetics as the science of systems organization and control. The article studies the principles of literature delimitation between cybernetics, social and economic sciences. The author determines the main place for general literature on mathematical modelling and other methods of process control simulation. The article considers the principles of delimitation from the literature using mathematical modelling as a research method. The author presents the control system as a complex of interrelated and interdependent elements that form an ordered integrity and unity. In the construction of “Informatics and information technology” section the priority is given to the literature for users. The author analyses the principles of delimitation between informatics, mathematics, technology and scientific-information activity. The sources on preparation of text and graphic documents, technical and accounting documentation are considered as information technology, and literature on study and use of computer programs for these purposes is collected in the relevant divisions on computer technology. The article studies the principles of delimitation of literature on information processes in computer networks, network equipment, etc. The author determines the main place for the literature on Internet technologies and analyses the principles of delimitation from the literature on information search as scientific-information activity, creation and programming of web sites. There is fixed the place for literature on information systems and databases, the main areas of research in the field of artificial intelligence, virtual reality and virtualization technology. “Information security” completes the section. Delimitation is carried out with the legal basis of information security and engineering protection of information. New sections of the LBC schedules have improved the classification of literature and made it more convenient to search the catalogues.
APA, Harvard, Vancouver, ISO, and other styles
12

Fesz, Maria. "Rethinking information work: A career guide for librarians and other information professionals." Technical Services Quarterly 34, no. 1 (December 12, 2016): 115–16. http://dx.doi.org/10.1080/07317131.2017.1238228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Doucette, Dail Dewitt. "Towards a New Science of Information." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 9, no. 2 (October 30, 2011): 278–85. http://dx.doi.org/10.31269/vol9iss2pp278-285.

Full text
Abstract:
This paper suggests a New Information Paradigm and recommends the establishment of a new academic and scientific discipline to be titled "Science of Information", built on a premise that information is also a major part of all the universes, elements, systems, and conditions. Therefore, it is also an integral part of all the other individual disciplines and sciences. It is essential to look beyond the limitations of how humans use and perceive information, or even how other living organisms use information. It is proposed that information is a continuous evolving process, that exists in some simple to complex form in every stage of development, across all scientific and academic domains, as well as being a significant part of everything that exists. Information is a trigger mechanism, emphasis and nutrient, not only for information activities itself but also all physical, and biological elements, systems and activities. Each existing discipline has within it a significant core Informational Element, which helps formulate and define that discipline. The Science of Information will bring together these core information elements in order to correlate, compare and assemble a combined theoretical base. This new discipline should be established as a meta-discipline. It should exist equally with traditional discipline categories such as physical, social science, arts, and humanities. It should not compete with or replace other disciplines. It should stand alongside them and assist them, as well as conduct comparisons and consolidations amongst multiple disciplines regarding information theories, methodologies, practices, by adding new perspectives, resources and developments.
APA, Harvard, Vancouver, ISO, and other styles
14

Dong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Full text
Abstract:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO, and other styles
15

Turdina, A. B., A. O. Kerimbayev, A. B. Mukushev, and B. A. Adilbekova. "FORMATION OF THE CONCEPT OF INFORMATION AMONG STUDENTS IN THE STUDY OF COMPUTER SCIENCE IN SECONDARY SCHOOL." BULLETIN Series of Physics & Mathematical Sciences 76, no. 4 (December 15, 2021): 234–40. http://dx.doi.org/10.51889/2021-4.1728-7901.32.

Full text
Abstract:
Information theory refers to the teaching of an interdisciplinary orientation. To date, the scientific and practical results of information theory have found wide application in computer science, mathematics, physics, linguistics and other fundamental sciences. The article describes the theoretical, practical and pedagogical aspects of the concept of information. It is established that information is a fundamental concept and its place in social and natural processes is determined. The role of the subject of computer science in the study of fundamental problems of the concept of information in the educational process of secondary and higher schools is considered. The essence and application of the Hartley and Shannon formulas are revealed. These equations are the basic equations of information theory. Based on the theory of probability, the concept of information uncertainty is given and the unit of its measurement is presented. Various scientific directions of information theory are investigated: the measurement of information values and the use of the Shannon equation in the testing process.
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Lin, Bart Thijs, and Wolfgang Glänzel. "What does scientometrics share with other “metrics” sciences?" Journal of the American Society for Information Science and Technology 64, no. 7 (May 7, 2013): 1515–18. http://dx.doi.org/10.1002/asi.22834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

ILKHAMOVNA, Khamdamova Malika. "Modern Information and Communication Technologies - as an Aspect of Improving the Quality of Teaching Biological Sciences: An Example of Teaching Human Anatomy and Physiology." Eurasia Proceedings of Educational and Social Sciences 25 (December 12, 2022): 95–99. http://dx.doi.org/10.55549/epess.1218201.

Full text
Abstract:
The actual problems of modern pedagogy are the use of information and computer technology in the learning process in the classroom on “Human Anatomy and Physiology”, are considered in the work. Today, the Republic of Uzbekistan pays special attention to the use of information and communication technologies in education. Uzbekistan is dynamically integrating into the global information space. Particular attention is paid to providing higher educational institutions with modern ICT tools and computer equipment, in particular, the phased acquisition of computers, servers, wireless network equipment, projectors and other multimedia equipment. The article discusses the features of teaching "Human Anatomy and Physiology" in pedagogical higher educational institutions using information and communication technologies, traditional and didactic lectures, problem-based learning and multimedia teaching aids.
APA, Harvard, Vancouver, ISO, and other styles
18

Badia, Giovanna. "Multiple Databases are Needed to Search the Journal Literature on Computer Science." Evidence Based Library and Information Practice 10, no. 4 (December 13, 2015): 241. http://dx.doi.org/10.18438/b8p31c.

Full text
Abstract:
A Review of: Cavacini, A. (2015). What is the best database for computer science journal articles? Scientometrics 102(3): 2059-2071. http://dx.doi.org/10.1007/s11192-014-1506-1 Objective – To compare the coverage of computer science literature in four bibliographic databases by checking the indexing of a selection of journal articles. The purpose of this comparison was to identify the most comprehensive database in computer science and determine whether more than one database is needed to search for articles on computer science topics. Design – Comparative database evaluation using citation analysis. Setting – Computer science journal literature found within the INSPEC, Scopus, Web of Science, and DBLP databases. Subjects – 1,135 computer science journal articles published by an Italian university’s researchers from 1979 to 2014. Methods – The University of Milan’s institutional repository (AIR), containing publications authored by the university’s researchers, was searched in October 2014 for journal articles that were assigned the subject heading “informatica” (the word for computer science in Italian). The author then searched the titles of these journal articles in each of the databases to check whether they were indexed. For articles indexed in all four databases, the author also examined the quality of the bibliographic records by looking for the presence of 20 elements (e.g., the “cited by” option, ranking of search results, precision of results, etc.) in each database’s record. These overlapping articles were also searched in Google Scholar to help compare the quality of the records between the databases. Main Results – Scopus indexed 75.86% of the journal articles found in AIR, Web of Science indexed 64.49%, DBLP indexed 61.15%, and INSPEC indexed 53.39%. Web of Science and INSPEC put together covered 74.80% of the articles, which is comparable to the amount indexed by Scopus. DBLP and Scopus contained the highest number of references to articles that were not found in the other databases, about 4% each. Out of the 1,135 journal articles, 391 (34.45%) were indexed by all four databases, with Web of Science scoring the highest for providing the best quality bibliographic records for these articles. Conclusions – According to the author, the findings showed that INSPEC, Scopus, Web of Science, and DBLP “complemented each other, in a way that neither one could replace the other” (p. 2068) when searching the computer science literature. While there was overlap between databases, they each also contained unique articles.
APA, Harvard, Vancouver, ISO, and other styles
19

JARKE, MATTHIAS, and CLARENCE A. ELLIS. "DISTRIBUTED COOPERATION IN INTEGRATED INFORMATION SYSTEMS." International Journal of Cooperative Information Systems 02, no. 01 (March 1993): 85–103. http://dx.doi.org/10.1142/s0218215793000058.

Full text
Abstract:
Cooperation is the organizational motivation behind computer networks. In these networks, information systems progress from their traditional file cabinet role to become advanced communications media that enable cooperation across boundaries of space and time. The Third ICIS Workshop, held at Dagstuhl Castle, Germany, in April 1992 addressed the question: what does this observation entail for computer science research, practice, and education? Research implications. Cooperation technology provides interfaces between people rather than between humans and machines. The simplistic distinctions of CSCW research in the 1980’s (synchronous vs. asynchronous, local vs. distributed, message passing vs. information sharing) detract from the central goal that coordination should not get in the way of human interaction. On the one hand, CSCW operates in a coherent organizational and technological framework. Real-time group interfaces must be embedded in process-oriented repositories for long-term cooperation; change management is the crucial research issue. On the other hand, CSCW must be enriched with domain information. Studies of the usage and organizational embedding of information technology cannot be delegated to the social sciences alone because they do not have the answers either. Business implications. “Killer applications” that prove the value of CSCW beyond electronic mail and videoconferencing have yet to emerge. One suggestion is to develop theory and product ideas in the context of actual applications through direct links between researchers and users. A more vendor-oriented approach focuses on developing core technology on which application-specific services can be delivered. This latter infrastructure market, though important, is obviously much smaller; it is the services that pay back the investments. Educational implications. Curricula do not adequately reflect the changing role of computer scientists in the workplace. This is even now endangering the traditionally good position of computer science graduates on the labor market. In accordance with the market shares above, there must be a stronger component of application experience and students must be explicitly taught to work in interdisciplinary teams. Since curricula are already very full, this implies that some traditional areas of computer science may have to be reduced — a painful but necessary process.
APA, Harvard, Vancouver, ISO, and other styles
20

Wainer, Jacques, Eduardo C. Xavier, and Fabio Bezerra. "Scientific production in Computer Science: A comparative study of Brazil and other countries." Scientometrics 81, no. 2 (April 16, 2009): 535–47. http://dx.doi.org/10.1007/s11192-008-2156-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Amjad, Tehmina, and Ayesha Ali. "Uncovering diffusion trends in computer science and physics publications." Library Hi Tech 37, no. 4 (November 18, 2019): 794–810. http://dx.doi.org/10.1108/lht-07-2018-0097.

Full text
Abstract:
Purpose The purpose of this paper is to trace the knowledge diffusion patterns between the publications of top journals of computer science and physics to uncover the knowledge diffusion trends. Design/methodology/approach The degree of information flow between the disciplines is a measure of entropy and received citations. The entropy gives the uncertainty in the citation distribution of a journal; the more a journal is involved in spreading information or affected by other journals, its entropy increases. The citations from outside category give the degree of inter-disciplinarity index as the percentage of references made to papers of another discipline. In this study, the topic-related diffusion across computer science and physics scholarly communication network is studied to examine how the same research topic is studied and shared across disciplines. Findings For three indicators, Shannon entropy, citations outside category (COC) and research keywords, a global view of information flow at the journal level between both disciplines is obtained. It is observed that computer science mostly cites knowledge published in physics journals as compared to physics journals that cite knowledge within the field. Originality/value To the best of the authors’ knowledge, this is the first study that traces knowledge diffusion trends between computer science and physics publications at journal level using entropy, COC and research keywords.
APA, Harvard, Vancouver, ISO, and other styles
22

Bird, Ian, Simone Campana, Pere Mato Vila, Stefan Roiser, Markus Schulz, Graeme A. Stewart, and Andrea Valassi. "A Software Institute for Data-Intensive Sciences, Joining Computer Science Academia and Natural Science Research." EPJ Web of Conferences 245 (2020): 08020. http://dx.doi.org/10.1051/epjconf/202024508020.

Full text
Abstract:
With the ever-increasing size of scientific collaborations and complexity of scientific instruments, the software needed to acquire, process and analyze the gathered data is increasing in both complexity and size. Unfortunately the role and career path of scientists and engineers working on software R&D and developing scientific software are neither clearly established nor defined in many fields of natural science. In addition, the exchange of information between scientific software development and computer science departments at universities or computing schools is scattered and fragmented into individual initiatives. To address the above issues we propose a new effort on a European level, which concentrates on strengthening the role of software developers in natural sciences, acts as a hub for the exchange of ideas among different stake-holders in computer science and scientific software and forms a lobbying forum for software engineering in natural sciences on an international level. This contribution discusses in detail the motivation, role and interplay with other initiatives of a “Software Institute for Data-Intensive Sciences”, which is currently being discussed between research institutes, universities and funding agencies in Europe. In addition to the current status, an outlook on future prospects of this initiative will be given.
APA, Harvard, Vancouver, ISO, and other styles
23

CHEN, Z. "LET DOCUMENTS TALK TO EACH OTHER: A COMPUTER MODEL FOR CONNECTION OF SHORT DOCUMENTS." Journal of Documentation 49, no. 1 (January 1993): 44–54. http://dx.doi.org/10.1108/eb026910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Guo, Yang Yong. "Integration Development of Network Communication and Computer Technology." Applied Mechanics and Materials 539 (July 2014): 234–38. http://dx.doi.org/10.4028/www.scientific.net/amm.539.234.

Full text
Abstract:
Through the computer network we can communicate with each other, and the development of the mobile communication technology cannot do without the computer technology. The program-controlled exchange, management, billing and so on in the telecommunication network are completed using the computers. The core network of the mobile communication system depends on the support of computer technology, and many of its elements are the computers of specific functions. The mobile communication and the computer network communication are the science processing the information, with the same signal styles, and they have many of the same subject theories, and a lot of the same technologies are also used in practice.
APA, Harvard, Vancouver, ISO, and other styles
25

You, Juan. "Application of Computer Network of Virtual Reality in Design of Art." Applied Mechanics and Materials 644-650 (September 2014): 3178–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3178.

Full text
Abstract:
The 21st century, which is called times of information or E-times by people, is a digital era based on electronic computer. Computer art design is an emerging comprehensive science, art design innovation applying computer and computer software as well as other instruments as main tools. Computers applied in design innovation, as significant tools in a new technology revolution, are more advanced than traditional design tools in terms of design technique, visual effect, working efficiency, work storage and medication.
APA, Harvard, Vancouver, ISO, and other styles
26

Calvert, Philip, Claire Creaser, and Chris Pigott. "Information access preferences and behaviour of Blind Foundation Library clients." Journal of Librarianship and Information Science 51, no. 1 (December 11, 2016): 162–70. http://dx.doi.org/10.1177/0961000616679880.

Full text
Abstract:
Library services to blind and visually impaired readers are changing as computer technology makes it possible to deliver reading material in a variety of new media formats. The Blind Foundation of New Zealand surveyed its library clients to discover the reading formats they currently used and which ones they preferred. The survey also asked questions about their access to computer technology and their personal assessment of their technological competency. There was a particular focus in the survey on the DAISY format and on services offering books by download. Analysis of the survey data shows that access to computer technology roughly matches the national profile. Use of computers generally declines with age, with iPhones and iPads being the exception. The DAISY format is both the most used and the most preferred format for reading, though not so overwhelmingly as to suggest other formats can be dropped. Computer competency declines with age, but among the younger respondents there seemed to be both the ability and the confidence to download books, and some were already using that service provided by the library. The library will make further investigations into why relatively few clients currently use the download service, and how clients envisage using such a service in the future.
APA, Harvard, Vancouver, ISO, and other styles
27

Zuboff, Shoshana. "Big other: Surveillance Capitalism and the Prospects of an Information Civilization." Journal of Information Technology 30, no. 1 (March 2015): 75–89. http://dx.doi.org/10.1057/jit.2015.5.

Full text
Abstract:
This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The institutionalizing practices and operational assumptions of Google Inc. are the primary lens for this analysis as they are rendered in two recent articles authored by Google Chief Economist Hal Varian. Varian asserts four uses that follow from computer-mediated transactions: data extraction and analysis,’ ‘new contractual forms due to better monitoring,’ ‘personalization and customization, ’ and continuous experiments. ’ An examination of the nature and consequences of these uses sheds light on the implicit logic of surveillance capitalism and the global architecture of computer mediation upon which it depends. This architecture produces a distributed and largely uncontested new expression of power that I christen: Big Other. ’ It is constituted by unexpected and often illegible mechanisms of extraction, commodification, and control that effectively exile persons from their own behavior while producing new markets of behavioral prediction and modification. Surveillance capitalism challenges democratic norms and departs in key ways from the centuries-long evolution of market capitalism.
APA, Harvard, Vancouver, ISO, and other styles
28

Robinson, John P., and Meyer Kestnbaum. "The Personal Computer, Culture, and Other Uses of Free Time." Social Science Computer Review 17, no. 2 (May 1999): 209–16. http://dx.doi.org/10.1177/089443939901700207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Evglevskaya, N. V. "DECISION-MAKING MODULE FOR INFORMATION AND COMMUNICATIONS NETWORK INFORMATION SECURITY MANAGEMENT." H&ES Research 12, no. 6 (2020): 60–67. http://dx.doi.org/10.36724/2409-5419-2020-12-6-60-67.

Full text
Abstract:
At a critical object information security management system and system of hacker, who realizes deconstructive computer attacks at any nodes of this object information and communications network are in confrontation. On the one hand, hacker influences at the object information and communications network for realizing main stages of agential and technical computer intelligences service and attacking afterwards. On the other hand, critical object information security management system finds unauthorized actions of hacker and realizes necessary measures to block/neutralize/prevent them. As practice shows, management impacts of information security management system make whith delay and most of all when hacker already has achieved the goal. For efficiency of decision-making for blocking/ neutralization/prevention of deconstructive computer attacks from hacker at the information and communications network nodes by the information security administrator of critical object, decision-making module of information security management system of information and communications network is offers. This module feature is the possibility of list formation of rational measures for protection critical object information and communications network considering network creation features, tactical and technical characteristics of network nodes, hacker opportunities. The module is based on mathematical models of the processes mentioned above and rational measures selection algorithm for protection of critical object information and communications network. Algorithm allows to find out possible reasons of insufficient efficiency of object information and communications network functioning in conditions when hacker realizes deconstructive computer attacks at network nodes.
APA, Harvard, Vancouver, ISO, and other styles
30

DeCew, Judith Wagner. "The Priority of Privacy for Medical Information." Social Philosophy and Policy 17, no. 2 (2000): 213–34. http://dx.doi.org/10.1017/s026505250000217x.

Full text
Abstract:
Individuals care about and guard their privacy intensely in many areas. With respect to patient medical records, people are exceedingly concerned about privacy protection, because they recognize that health care generates the most sensitive sorts of personal information. In an age of advancing technology, with the switch from paper medical files to massive computer databases, privacy protection for medical information poses a dramatic challenge. Given high-speed computers and Internet capabilities, as well as other advanced communications technologies, the potential for abuse is much greater than ever before. At every stage in the process of collection and storage, dangers can arise, including entry errors, improper access, exploitation, and unauthorized disclosure. Secondary use and aggregation of data are all far easier, faster, and less expensive, and thus pose additional threats to an individual's control over the disposition of medical information.
APA, Harvard, Vancouver, ISO, and other styles
31

Tatnall, Arthur. "Computer education and societal change." Information Technology & People 28, no. 4 (November 2, 2015): 742–57. http://dx.doi.org/10.1108/itp-09-2014-0202.

Full text
Abstract:
Purpose – It is widely acknowledged that the computer has caused great societal changes over recent years, but the purpose of this paper is to relate specifically to those due to the use of computers in education and teaching about computing. The adoption and use of computers in education was very much a socio-technical process with influence from people, organisations, processes and technologies: of a variety of human and non-human actors. Design/methodology/approach – This paper makes use of actor-network theory to analyse these events and their educational and societal impact. Data were collected from published sources, interviews with those involved at the time, discussions and from personal experience and observations. Findings – Computers have, of course, had a huge impact on society, but particularly in relation to the use of computers in school education there was a different societal impact. Some of this related directly to education, some to school administration and some to student attitudes, experiences and knowledge. Research limitations/implications – The paper investigates the development of early courses in computing in universities and schools in Victoria, Australia. The paper does not, however, consider the use of computers in university research, only in education. Practical implications – The paper describes the significant educational events of the era from punch-card tabulating machines in the 1930s to micro-computers in the late 1980s, and investigates the relationship between the development of courses in the Universities and those in the more vocationally oriented Colleges of Advanced Education. It examines whether one followed from the other. It also investigates the extent of the influence of the universities and CAEs on school computing. Social implications – The advent of the computer made a significant impact on university and school education even before the internet, Google, Wikipedia and smart phones in the late 1990s and 2000s. Computers in schools cause a rethink of how teaching should be handled and of the role of the teacher. Originality/value – This paper investigates the history of computers and education in both universities and schools in Victoria, Australia over the period from the 1930s to the early 1990s. It considers how and why this technological adoption occurred, and the nature of the resulting educational and societal change this produced. Primary and High School use of computers did not commence until the 1970s but prior to this there is a considerable and interesting history associated with the development of Higher Education courses relating to computing.
APA, Harvard, Vancouver, ISO, and other styles
32

Journal, Baghdad Science. "DIFFICULTIES IN USING THE INTERNET IN THE TEACHING OF SCIENCES." Baghdad Science Journal 4, no. 2 (June 3, 2007): 263–70. http://dx.doi.org/10.21123/bsj.4.2.263-270.

Full text
Abstract:
The present research aims at recognizing the difficulties and problems which hamper teachers and educators alike when using the internet for educational purposes.It discusses the benefits of the internet as a source of information or publication and as a communicative tool.Arandom sample of (30) teachers working at schools in Baghdad / Second Risafa,was selected.Three of the sample members use the internet for student project plans via internet centers, whereas 16 of them use it for chatting, emailing and research purposes.The rest of the sample have limited knowledge of the internet. The researcher used the interviewing method to gather data from the sample members.The method involved eleven questions which required their replies.The repeated distribution and the percentage were employed to analyze the collected data.Among the conclusions arrived at is that the difficulties confronted by the teachers are their computer and internet illiteracy, particularly in teaching sciences, lack of internet and computer training courses,unavailability of computers, shortage of computer and internet guides and manuals which,even when available,do not match the ongoing progress,lack of technical support,continuing power failure, high cost of computers and internet access systems, anxiety and fear of misusing the internet, which led to negative orientation in internet use,fear of accessing non-educational sites,fear of losing focus when browsing the web, in addition to the teachers’ lack of knowledge of other languages such as the English. The study makes the following recommendations.It recommends that the Ministry of Education should provide computers which are connected to the internet.Computer and internet training courses must also be held to provide teachers with the skills they need to use the internet in teaching science.There should also be curricula prepared which include the use computers and the internet in most subjects, particularly science.Material and technical support should also be provided for schools.
APA, Harvard, Vancouver, ISO, and other styles
33

Asubiaro, Toluwase Victor, and Oluwole Martins Badmus. "Collaboration clusters, interdisciplinarity, scope and subject classification of library and information science research from Africa: An analysis of Web of Science publications from 1996 to 2015." Journal of Librarianship and Information Science 52, no. 4 (March 1, 2020): 1169–85. http://dx.doi.org/10.1177/0961000620907958.

Full text
Abstract:
This study investigated the trends in the scope and subject classifications of library and information science research from authors that are affiliated with institutions in Africa. Library and information science journal articles and conference proceedings from the 54 African countries that were published between 2006 and 2015 and indexed in the Web of Science were retrieved for the study. After the removal of non-relevant articles and articles that were not available online, the library and information science publications were classified based on subject and scope. Results from the analysis of author keywords, country of affiliation, subject and scope classification were also visualized in network maps and bar charts. Frequency analysis shows that though computer science had the most profound influence on Africa’s library and information science research, its influence came to prominence in 2004. Furthermore, North African countries exhibited features that are different from the rest of Africa; they contributed most on core computer classifications while other African countries focused more on the social science-related aspects of library and information science. Unlike other regions in Africa, the North African countries also formed a dense collaboration cluster with strong interests in subjects that are conceptual and global in scope. The collaboration clustering analysis revealed an influence of some colonial languages of as a basis for forging strong collaboration between African and non-African countries. On the other hand, African countries tend to collaborate more with countries in their regions. Lastly, human computer interaction and library and information science history subject classifications were almost nonexistent. It is recommended that further studies should investigate why certain subject classifications are not well represented.
APA, Harvard, Vancouver, ISO, and other styles
34

Baranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.

Full text
Abstract:
Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.
APA, Harvard, Vancouver, ISO, and other styles
35

Loomes, Martin. "Selfconscious or Unselfconscious Software Design?" Journal of Information Technology 5, no. 1 (March 1990): 33–36. http://dx.doi.org/10.1177/026839629000500106.

Full text
Abstract:
Anyone who is involved in computer science education will be used to engaging in passionate debates over questions such as ‘What programming language should we be teaching'? Moreover, if these debates take place in front of colleagues from other disciplines, for example when joint schemes are being developed, then concern is often expressed about the inability of computer scientists to come to any generally accepted conclusions. In this paper the view is proposed that the key questions of computer science education are really manifestations of a much deeper issue in computing which has been alluded to in various publications, but never discussed to a generally accepted conclusion by the computer science community at large.
APA, Harvard, Vancouver, ISO, and other styles
36

Al Hijji, Khalfan Zahran Hamed, and Khaled Ateeq Saeed Abdullah. "The Specialization of Information Science and its Relationship with other Specializations: The Experience of the Department of Information Studies at Sultan Qaboos University." Journal of Arts and Social Sciences [JASS] 7, no. 3 (December 1, 2016): 141. http://dx.doi.org/10.24200/jass.vol7iss3pp141-154.

Full text
Abstract:
This study aims to explore the interdisciplinary research and courses of the Department of Information Studies (DIS) at Sultan Qaboos University with other disciplines in the university, and to explore its impact on the management and development of various academic programs of the department. To achieve this objective, the study utilized qualitative research methods such as: content analysis of documents, written plans, and course syllabi of the department and open interviews with faculty members to identify kinds of relations with other scientific disciplines they seek when building their academic programs. The study revealed that the interdisciplinary relations of the department exist in all its programs. The DIS PhD program was initiated as an interdisciplinary program in cooperation with departments of Information Systems, Management, and Computer Science. Further, the interdisciplinary path of the Masters’ program is clearly seen in the variation of topics that dissertations have discussed, which include human resources, marketing, bibliometric studies, social media, e-government, information literacy, manuscripts, and technology acceptance. The Higher Diploma in Medical Libraries is directed towards qualifying specialist librarians for health and medical libraries. Students admitted in this program are usually selected from those who apply from biology and health sciences. Lastly, in the undergraduate level, DIS provides the bachelor of Learning Resource Centers in Faculty of Education with number of specialized courses. In the main time there are many electives and required courses from different disciplines that are included in the department’s undergraduate study plan.
APA, Harvard, Vancouver, ISO, and other styles
37

Dahlö, Martin, Frέdέric Haziza, Aleksi Kallio, Eija Korpelainen, Erik Bongcam-Rudloff, and Ola Spjuth. "Biolmg.org: A Catalog of Virtual Machine Images for the Life Sciences." Bioinformatics and Biology Insights 9 (January 2015): BBI.S28636. http://dx.doi.org/10.4137/bbi.s28636.

Full text
Abstract:
Virtualization is becoming increasingly important in bioscience, enabling assembly and provisioning of complete computer setups, including operating system, data, software, and services packaged as virtual machine images (VMIs). We present an open catalog of VMIs for the life sciences, where scientists can share information about images and optionally upload them to a server equipped with a large file system and fast Internet connection. Other scientists can then search for and download images that can be run on the local computer or in a cloud computing environment, providing easy access to bioinformatics environments. We also describe applications where VMIs aid life science research, including distributing tools and data, supporting reproducible analysis, and facilitating education. BioImg.org is freely available at: https://bioimg.org .
APA, Harvard, Vancouver, ISO, and other styles
38

Morris, Neil P., Luke Ramsay, and Vikesh Chauhan. "Can a tablet device alter undergraduate science students' study behavior and use of technology?" Advances in Physiology Education 36, no. 2 (June 2012): 97–107. http://dx.doi.org/10.1152/advan.00104.2011.

Full text
Abstract:
This article reports findings from a study investigating undergraduate biological sciences students' use of technology and computer devices for learning and the effect of providing students with a tablet device. A controlled study was conducted to collect quantitative and qualitative data on the impact of a tablet device on students' use of devices and technology for learning. Overall, we found that students made extensive use of the tablet device for learning, using it in preference to laptop computers to retrieve information, record lectures, and access learning resources. In line with other studies, we found that undergraduate students only use familiar Web 2.0 technologies and that the tablet device did not alter this behavior for the majority of tools. We conclude that undergraduate science students can make extensive use of a tablet device to enhance their learning opportunities without institutions changing their teaching methods or computer systems, but that institutional intervention may be needed to drive changes in student behavior toward the use of novel Web 2.0 technologies.
APA, Harvard, Vancouver, ISO, and other styles
39

Gray, Paul. "OUTSOURCING AND OTHER STRATEGIES." Information Systems Management 11, no. 4 (January 1994): 72–75. http://dx.doi.org/10.1080/07399019408964676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Petrie, J. Howard. "Microcomputer-based Networks in Libraries and Information Services." Journal of Information Technology 3, no. 2 (June 1988): 76–78. http://dx.doi.org/10.1177/026839628800300202.

Full text
Abstract:
A microcomputer on everyone's desk is the norm in some organizations and is rapidly becoming so in many others. The incentive to link them together into networks is also growing. Reasons include: access to databases inside the organization and from elsewhere, electronic mail, and making the most out of available equipment, among others. Until recently, some computer equipment suppliers paid little heed to please from users for flexible networks to link their machines. On the other hand, others have emphasized the ability of their equipment to be networked together and with that of other manufacturers.
APA, Harvard, Vancouver, ISO, and other styles
41

Archer, Wendy, Stefano Consiglio, Paolo Ferri, Luca Pareschi, and Silvio Peroni. "Call for papers: Automatic understanding of texts in social and computer sciences." puntOorg International Journal 1, no. 1 (January 2019): 1. http://dx.doi.org/10.19245/25.05.cfp.05.

Full text
Abstract:
Over the last 20 years, the use of automated and semi-automated techniques for extracting meanings from text have been widely debated in the social sciences. Automated and semi-automated techniques can be employed in all research phases: data collection (e.g. scraping), data cleaning (e.g. lemmatization of words), analysis (e.g. Named Entity Recognition, Part-of-speech Tagging, Topic Modeling, Keyword Analysis, Semantic Network Analysis, Sentiment Analysis), and visualization. Far from forcing epistemological choices, these techniques can be inductively used to deal with big corpora of data, impossible to work with for a human being. The debate produced great expectations, but substantive research results and the development of actual user friendly tools are still relatively scarce. Social researchers usually lack the technical skills to develop and integrate new research tools as instruments able to radically change the way the research is devised and conducted. Computer scientists, on the other hand, often lack regular opportunities to interact with social scientists in ways that would enable greater understanding and more widespread use to be derived from the introduction of new tools. Moreover, in social and organizational sciences, different researchers use different techniques, but both a broader reflection on the advantages and disadvantages of each technique, and an integration/comparison of different tools, are lacking. A critical review of how these techniques are used in social sciences is a valuable and welcome contribution that would enable researchers working in these areas to disentangle the technicalities of these numerous and diverse techniques and showcase the research approaches they are used for. This call for papers follows an initial stream of research developed by the CATARSI project at the University of Bologna. CATARSI (Comprensione Automatica di Testi e ARticoli nelle scienze Sociali e Informatiche – automatic understanding of texts and articles in social sciences and computer sciences) aims at tackling the interface between social sciences and information science and improving both the knowledge and the development of computer-based techniques for analyzing texts and extracting meanings. The issue tackled by CATARSI, thus, is cultural and practical, and its results will impact both on information science, which deals more with ontological aspects, and on the social sciences, which stand to benefit from the use of new instruments to improve the way knowledge is analyzed and created. This Call for Papers (CfP) aims thus at collecting contributions able to shed light on the current use of semi-automatic and computer-aided techniques for understanding texts and extracting meanings from them, especially within the social sciences. Topics include, but are not limited to: application of one or more semi-automated techniques to organizational studies; critical reviews on how semi-automated techniques are used to elicit meanings from texts in organization science; comparison of qualitative and computer-aided techniques in conducting research; analysis of the ways different techniques are used to grasp meaning from texts; cross-field and interdisciplinary applications of automatic analysis techniques; description of new tools and systems for the use and application of these methods; critical reviews on the evolution of automatic reading within social and organization science. We welcome different theoretical and empirical methodologies. Qualitative, quantitative, and experimental methodologies are welcome. Full paper submission deadline: 31st October 2019
APA, Harvard, Vancouver, ISO, and other styles
42

Haddow, Gaby. "Citations to Conference Papers Indicate They Are Declining in Importance across All Discipline Areas." Evidence Based Library and Information Practice 4, no. 2 (June 14, 2009): 164. http://dx.doi.org/10.18438/b8k904.

Full text
Abstract:
A Review of: Lisée, Cynthia, Vincent Larivière and Eric Archambault. Conference Proceedings as a Source of Scientific Information: A Bibliometric Analysis.‛ Journal of the American Society for Information Science and Technology 59.11 (2008): 1776-84. Objective – To compare the impact and ageing of conference proceedings with that of scientific literature in general, as reflected in citation characteristics. Design – Citation analysis. Setting – Thomson’s Science Citation Index, Social Science Citation Index, and Arts and Humanities Citation Index (CD-ROM version). Subjects – Conference proceedings citations. Methods – The Thomson citation indexes were searched to identify all citations to conference proceedings in natural sciences and engineering (NSE) and social sciences and humanities (SSH) from 1980 to 2005. Keywords in English, Spanish, Italian and German, truncated terms (such as ‘bienn’), single letters (such as P), and numbers were combined to retrieve all possible citations. Additional filters to exclude citations to publications other than proceedings were applied to the P search results, which had accounted for 75% of the total results. The references remaining in the P search set were validated using Google Scholar and WorldCat. Finally, two random samples of 1,000 references were checked manually to determine the extent of false positives and false negatives in the results. Main Results – The study’s findings are presented for NSE and SSH separately, with 1.7% of NSE citations and 2.5% of SSH citations referring to conference proceedings. The total number of citations to proceedings has increased over the period 1980-2005, however, citations to proceedings in NSE and SSH as a proportion of all citations decreased during this time. A small increase in the average number of proceedings citations per paper was found for NSE and SSH. When this increase is compared to the overall increase in references per paper over this period, the share of proceedings citations per paper has decreased. Of all fields in NSE and SSH, only engineering has increased the proportion of proceedings citations, rising from 7% to 10% in the period studied. In 2005, the share of proceedings citations in NSE (excluding engineering) was below 3%, and for SSH it was below 1.5%. The share of proceedings citations varies across different fields within NSE and SSH. Engineering fields and computer science range from around 5% (general engineering) to 19.6% (computers) in the share of proceedings citations, with only five of the 109 NSE fields having 10% or more as a share of proceedings citations. SSH has only one field (ergonomics, 7.6%) with a share of proceedings citations over 5%. Transport studies has a share of proceedings just under 5%, followed by the field information science & library science with proceedings citations at 3.3%. In relation to the ageing characteristics of proceedings citations overall, the findings show a median age of 4.0 years compared with 6.1 years for citations to literature in general. The difference between the age of NSE cited proceedings and NSE cited literature in general had decreased during the period specified. In 1980, the median age of NSE cited proceedings was 6.3 years compared with 9.3 years for NSE citations to literature in general. In 2005, the median ages were 8.4 years and 10.1 years, respectively. The median age of SSH cited proceedings in 2005 was 10.3 years, compared with 14.2 years for all SSH cited literature. Cited literature in general is older for SSH (14.2 years) than NSE (10.1 years), but the age difference between proceedings cited in the two discipline areas is almost half this. A number of fields in NSE (such as physics, chemistry, and engineering) indicate a greater difference between the age of cited proceedings and literature in general, while for others (such as biology and biomedical research) the ageing characteristics are similar. In SSH, the difference between age of cited proceedings and literature in general is greater. Fine arts and psychology proceedings citations are 43% younger than citations to literature in general; literature cited proceedings are 42% younger, and social sciences 31% younger. Humanities are an exception, with cited proceedings only 11% younger than citations to literature in general. Conclusion – Only 2% of all citations are to conference proceedings in NSE and SSH combined; a proportion that has declined over the 25-year period studied. While there was an increase in the average number of (all) citations per paper during this time, proceedings citations per paper have seen only a very slight increase. These findings are true of all fields studied, with the exception of engineering-related fields which have enjoyed an increase of over 2% in proceedings citations in the period studied. The results also indicate the importance of proceedings in the field of computers. The authors speculate that in these fields, proceedings are regarded as ‚more than just prototypes, but rather as the final products of scientific research.‛ Due to the higher proportion of proceedings citations in engineering and computer science fields, they should be considered for analysis in bibliometric studies. Despite arriving at this conclusion, the authors suggest that computer scientists might consider publishing their papers through channels other than conference proceedings to ‚maximize their scientific impact [original italics].‛ They support this statement by noting that although proceedings citations in computer science represent 20% of total citations, a study of Australian computer science research output (Butler) found proceedings comprise over 60% of all publications in computer science. The authors suggest that the difference between the proportion of proceeding published and the proportion of proceedings cited indicate that their scientific impact does not seem to be all that important.‛ In all fields, proceedings are cited sooner after publication and they cease to be cited earlier than literature in general. These results indicate that proceedings deliver more current information and cutting edge research findings than literature in general. The differences between ageing of proceedings citations and of literature in general lead the authors to conclude that conference proceedings serve different functions and have different life cycles depending on the community they serve.‛
APA, Harvard, Vancouver, ISO, and other styles
43

Sosińska-Kalata, Barbara. "Interdisciplinarity of Information Science Research: Introduction." Zagadnienia Informacji Naukowej - Studia Informacyjne 58, no. 1A(115A) (November 20, 2020): 9–23. http://dx.doi.org/10.36702/zin.721.

Full text
Abstract:
Purpose/Thesis: The article aims to present and discuss some introductory reflections on the nature of interdisciplinarity of research conducted in the field of information science and its effect on the reorganization of the institutional setting of the discipline.Approach/Methods: This is a conceptual review article based on theoretical considerations and critical analysis of the concept of interdisciplinarity and the features of interdisciplinary approaches employed in information science research and its effect on the position of information science in university structure.Results and Conclusions: The concept of interdisciplinarity is discussed with reference to two aspects of the development of science: specialization and integration. The article presents selected typologies of interdisciplinarity and discusses the changes in the perception of the concept of discipline. Interdisciplinarity has been discussed as an inherent feature of information science. The types of interdisciplinarity that best correspond to the specificity of the interdisciplinary approach used in information science research has been indicated. Referring to previous studies, the article sketches the most characteristic interdisciplinary connections of information science. In general, the review shows that apart from the permanent relationship with social sciences, in particular with library science and computer science, the relationships between information science and other disciplines are variable and quite loose. Stronger relationships are most often generated through practical activity in related disciplines, in which specialized information services are the most developed and widely used.Originality/Value: The view that information science is by its very nature an interdisciplinary field of research is common among information researchers and information professionals. Much research has been done on the interdisciplinary connections of the discipline, however, by the best author’s knowledge, few of them analyzed the specificity of interdisciplinarity of this field of research. This article attempts to initiate an in-depth discussion on this issue.
APA, Harvard, Vancouver, ISO, and other styles
44

Madsen, Wayne. "Total information system reborn in other US agencies." Computer Fraud & Security 2004, no. 3 (March 2004): 2–3. http://dx.doi.org/10.1016/s1361-3723(04)00036-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kapp, Marco, and Simon Oxley. "Handling information and other risks: routes to success." Computer Fraud & Security 2010, no. 10 (October 2010): 8–10. http://dx.doi.org/10.1016/s1361-3723(10)70131-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Blackman, Michael. "Summary of articles; other information." World Patent Information 28, no. 3 (September 2006): 202–3. http://dx.doi.org/10.1016/j.wpi.2006.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Blackman, Michael. "Summary of articles: Other information." World Patent Information 28, no. 4 (December 2006): 294–95. http://dx.doi.org/10.1016/j.wpi.2006.07.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Morze, Nataliia, and Tetiana Efymenko. "WHY SHOULD FUTURE COMPUTER SCIENCE TEACHERS STUDY COMPUTER DESIGN?" OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, no. 13 (2022): 74–88. http://dx.doi.org/10.28925/2414-0325.2022.136.

Full text
Abstract:
Teaching the discipline "Fundamentals of Computer Design" to students of Computer Science specialties of pedagogical universities is connected with modern educational trends arising from the requirements of the labor market. The paper substantiates the need to introduce this course in the educational process of training of pre-service Computer Science teachers, taking into account the professional teacher standard and the state standard in Computer Science. It is noted that the teaching of this course contributes to the formation of important interdisciplinary and subject professional competencies, including information and digital competence, which are necessary for both a modern specialist in the field of ICT and pre-service Computer Science teachers. The connection of this course with other disciplines that should be taught to pre-service Computer Science teachers according to the curriculum is presented. A survey of 1st year students majoring in "Informatics" was conducted to determine their knowledge and skills that they received before entering the university, their attitude to the use of various software used in the modern market of information and communication technologies for processing graphic data. The analysis of the respondents' answers showed what kind of graphic editors they use, which in turn allowed us to conclude that the conditions for pre-service teachers to achieve relevant competencies in computer design have changed.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Peng. "Research on Sports Training Action Recognition Based on Deep Learning." Scientific Programming 2021 (June 29, 2021): 1–8. http://dx.doi.org/10.1155/2021/3396878.

Full text
Abstract:
With the rapid development of science and technology in today’s society, various industries are pursuing information digitization and intelligence, and pattern recognition and computer vision are also constantly carrying out technological innovation. Computer vision is to let computers, cameras, and other machines receive information like human beings, analyze and process their semantic information, and make coping strategies. As an important research direction in the field of computer vision, human motion recognition has new solutions with the gradual rise of deep learning. Human motion recognition technology has a high market value, and it has broad application prospects in the fields of intelligent monitoring, motion analysis, human-computer interaction, and medical monitoring. This paper mainly studies the recognition of sports training action based on deep learning algorithm. Experimental work has been carried out in order to show the validity of the proposed research.
APA, Harvard, Vancouver, ISO, and other styles
50

Seizgain, Mohammad Maruf. "Development of Biology in the Passage of History." International Journal for Research in Applied Sciences and Biotechnology 9, no. 1 (February 24, 2022): 188–90. http://dx.doi.org/10.31033/ijrasb.9.1.23.

Full text
Abstract:
The aim of this research is to provide a wealth of information on the history of the development of biology in the passage of history. Beginning with the wizarding era and ending with heart and neurosurgery and hundreds of other developments in Biological Science based on scientific methods. This means that biology is one of the oldest sciences and human beings with intellect, logic, thought and will have drawn many dark corners of ambiguities and are still trying to use chemical, physical, technical, computer and other sciences. Biology was born in ancient Greece in the 6th-7th centuries BC and was developed by the great philosophers of the world such as Hippocrates, Aristotle and other Greek philosophers. Famous Roman scientists have also done great service in the development of this science. With the advent of the holy religion of Islam, Islamic scholars in the field of medicine and other scientific sciences have done great service. The services of Abdul Malik Samael, Abul Hassan Ali bin Sahl Tabari and Abul Mohammad Zakaria Razi in the development of biology are unforgettable. The great scientists of the world of science have succeeded in discovering important biological problems since the seventeenth century.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography