Information in Computer Science
نویسنده
چکیده
Before we address the topic of “Information in Computer Science,” it is obvious that we will have to say something about what is meant by “information.” I expect this to be a common preoccupation of the many authors contributing to this volume. Though perhaps not as obvious, it turns out equally important that we should be clear what is meant by “Computer Science.” Incidentally, we will take for granted the meaning of the word “in” and never say “It depends upon what the meaning of the word ‘in’ is.”
منابع مشابه
Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery
this research explores the manipulation of biomedical big data and diseases detection using automated computing mechanisms. As efficient and cost effective way to discover disease and drug is important for a society so computer aided automated system is a must. This paper aims to understand the importance of computer aided automated system among the people. The analysis result from collected da...
متن کاملMeasuring the Performance of the Virtual Teams in Global Software Development Projects
The development teams who are geographically spread, culturally mixed and mainly depend on information and communication technology (ICT) for communication is defined as a global virtual teams (GVTs). Despite the advancement of technologies, achieving the efficient performance of GVTs remains a challenge. The reviewed literature has highlighted the importance of training and development, organi...
متن کاملAn Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation
Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...
متن کاملImage Backlight Compensation Using Recurrent Functional Neural Fuzzy Networks Based on Modified Differential Evolution
In this study, an image backlight compensation method using adaptive luminance modification is proposed for efficiently obtaining clear images.The proposed method combines the fuzzy C-means clustering method, a recurrent functional neural fuzzy network (RFNFN), and a modified differential evolution.The proposed RFNFN is based on the two backlight factors that can accurately detect the compensat...
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملTransforming Fuzzy State Diagram to Fuzzy Petri net
UML is known as one of the most common methods in software engineering. Since this language is semi-formal, many researches and efforts have been performed to transform this language into formal methods including Petri nets. Thus, the operation of verification and validation of the qualitative and nonfunctional parameters could be achieved with more ability. Since the majority of the real world...
متن کامل