Computer and Information Science

Journal Information
ISSN / EISSN : 1913-8989 / 1913-8997
Current Publisher: Canadian Center of Science and Education (10.5539)
Total articles ≅ 859
Current Coverage
LOCKSS
Archived in
SHERPA/ROMEO
Filter:

Latest articles in this journal

Oleg V. Moroz
Computer and Information Science, Volume 14; doi:10.5539/cis.v14n2p1

Abstract:
In this paper, Kant's philosophical doctrine of the categories of the reason is used to substantiate the conceptual model of knowledge representation, based on the collective interaction of a lot of intellectual atomic elements of knowledge (knowledge quanta), which are combined into clusters like neurons in the brain; and also a phenomenological description of the corresponding universal ontology, proceeding from the philosophical premise of Husserl-Heidegger that the meaning of intelligence is not so much in knowing the absolute truth as in survival, is presented. In the process of cognizing the surrounding world, a person uses both a priori knowledge and a posteriori knowledge, but the transcendental content of a priori forms of thinking does not allow them to be used directly in logical judgments. Nevertheless, one can try to use them as "ontological predicates" following the advice of I. Kant, what was done in this article. Heuristic ontological relations that directly follow from the categories of Kant are easy to use and sufficient to describe any ontology. Offered knowledge representation model, the key idea of which is the primacy of knowledge to logical inference and their emergent ability to self-organize, in conjunction with the transcendental logic-based ontology of empirical knowledge can be used to create a universal inference engine.
Chris Lee
Computer and Information Science, Volume 14; doi:10.5539/cis.v14n1p54

Abstract:
Reviewer Acknowledgements for Computer and Information Science, Vol. 14, No. 1, 2021
Subrahmanyam Vaddi, Dongyoun Kim, Chandan Kumar, Shafqat Shad, Ali Jannesari
Computer and Information Science, Volume 14; doi:10.5539/cis.v14n1p45

Abstract:
Unmanned Aerial Vehicles (UAVs) equipped with vision capabilities have become popular in recent years. Many applications have especially been employed object detection techniques extracted from the information captured by an onboard camera. However, object detection on UAVs requires high performance, which has a negative effect on the result. In this article, we propose a deep feature pyramid architecture with a modified focal loss function, which enables it to reduce the class imbalance. Moreover, the proposed method employed an end to end object detection model running on the UAV platform for real-time application. To evaluate the proposed architecture, we combined our model with Resnet and MobileNet as a backend network, and we compared it with RetinaNet and HAL-RetinaNet. Our model produced a performance of 30.6 mAP with an inference time of 14 fps. This result shows that our proposed model outperformed RetinaNet by 6.2 mAP.
Cartmell Warrington, Javaid Syed, Ruth M. Tappin
Computer and Information Science, Volume 14; doi:10.5539/cis.v14n1p44

Abstract:
The Big Five Factors Model (FFM) of personality traits theory was tested for its ability to explain employee information security behavior (EISB), when age, measured by generational cohort (GCOHORT), moderated the relationship between the independent variables (IVs) extraversion, agreeableness, conscientiousness, emotional stability, intellect (EACESI) and the dependent variable (DV), employees’ information security behavior (EISB) which is measured by file protection behavior (FPB). Three age groups defined GCOHORT: 52–70 years old (1946–1964, Baby Boomers), 36–51 yrs old (1965–1980, Generation X), and 18– 35 yrs. Old (1981–1998, Millennial). Results of hierarchical multiple regressions analyses revealed statistically significant relationships between overall personality traits, four individual factors of personality traits, and the DV (p < .05). However, contrary to expectations, GCOHORT did not moderate the relationship between any of the main IVs and the DV (p > .05). Recommendations for future research are offered.
Yijie Han, Chen Sun
Computer and Information Science, Volume 14; doi:10.5539/cis.v14n1p8

Abstract:
In the ridesharing problem different people share private vehicles because they have similar itineraries. The objective of solving the ridesharing problem is to minimize the number of drivers needed to carry all load to the destination. The general case of ridesharing problem is NP-complete. For the special case where the network is a chain and the destination is the leftmost vertex of the chain, we present an O(nlogn/logw) time algorithm for the ridesharing problem, where w is the word length used in the algorithm and is at least logn. Previous achieved algorithm for this case requires O(nlogn) time.
Maham Imtiaz, Samina Khalid, Saleema Khadam, Sumaira Arshad, Ali Raza, Tehmina Khalil
Computer and Information Science, Volume 14; doi:10.5539/cis.v14n1p14

Abstract:
Web has gotten one of the essential civilities for everyday living. Each individual is generally getting to the information specially E-mail and data through Web. Nonetheless, daze individuals face challenges in getting to these content materials, likewise in utilizing any help given through Web. The progression in PC based available frameworks has opened up numerous roads for the outwardly debilitated over the globe in a wide manner. Sound input based virtual climate like, the screen readers have helped Blind individuals to get to Web applications colossally. We depict the Voice-mail framework design that can be utilized by a Blind individual to get to messages effectively and productively. The commitment built by this examination has empowered the visually impaired public to deliver and get voice-based e-mail messages in their local language with the assistance of a PC (Ingle, P., Kanade, H., & Lanke, A. 2016).
Mohammed Abu Shquier
Computer and Information Science, Volume 14; doi:10.5539/cis.v14n1p1

Abstract:
Online education has positively influences student performance during universities lockdown nowadays due to COVID-19, in fact both educators and students have proven their ability to develop their teaching skills by emerging several technological tools. This article analyses the performance of two cohorts of students, the first cohort was taught traditionally while the other was taught online, the scope of this study is the students enrolled in programming languages at the Faculty of Computer Science and Information Technology at Jerash University, the study was carried out between the years 2017 - 2020. 1210 students have participated in the study. This study investigates a comparative study between different methods of delivering programming-languages courses over the 3-year period, the study also aims to shed light on the impact of traditional methods on delivering computer-programming courses and how it could be improved by emerging a SCORM learning multimedia and other learning modules, activities and resources. Result shows that online delivering of courses with the use of SCORM and other tools improves students’ scores and performance slightly, the article concludes that emerging technology to learning can improve the students' creativity, understanding and performance overall.
Austin Liu
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n4p42

Abstract:
The information transfer protocol that supports the modern Internet with its hundreds of thousands of petabytes per month to billions of Internet users across the world was designed in 1981, and it lacks the capacity to properly ensure the security and stability of the Internet today. Features such as the prevention of network attacks, a large address space for the increasing number of devices, verification of the source of an Internet request, and so on are all absent from the current architecture. This paper seeks to review, summarize, and compare six proposals submitted to address the issues IP faces: the Accountable Internet Protocol, the Expressive Internet Architecture, MobilityFirst, Passport, StopIt, and the Traffic Validation Architecture. Finally, the paper details a protocol design that not only is feasible to adopt with the present infrastructure/computing power but also addresses some of the pressing issues of IP, with particular focus on the address space, mitigation of network attacks, and source verification.
Wail El Hilali, Abdellah El Manouar, Mohammed Abdou Janati Idrissi
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n4p32

Abstract:
In these challenging times, finding a way to sustain the created value becomes a must. The fierce competition, the risk of disruption, the rise of customer awareness and the scarcity of resources, all these are few of many drivers that push companies to invest in sustainability. This paper is an attempt to enrich the literature about this subject. It mainly explores how to use the AHP method, a well-known multicriteria decision making technique, to decide about the right actions to implement, in order to reach sustainability. The paper is a continuity of a previous work that introduced a new framework that explained how companies could sustain their business models through information systems (IS). This approach was applied on a telecom operator, as a case study, to explain well how companies could choose the right actions to implement, in order to reach sustainability.
Chris Lee
Computer and Information Science, Volume 13; doi:10.5539/cis.v13n4p48

Abstract:
Reviewer Acknowledgements for Computer and Information Science, Vol. 13, No. 4, 2020
Back to Top Top