In this research, we developed a multilayered inventory management software which pledges to revolutionize how inventories are sorted and maintained. However, current inventory management software ...
{"title":"Artificial intelligence operated data warehouse","authors":"CvetovichJoseph, LinnHarrison, DaigleKaylea, HuddlestonPhil, IslamABM Rezbaul","doi":"10.5555/3447080.3447117","DOIUrl":"https://doi.org/10.5555/3447080.3447117","url":null,"abstract":"In this research, we developed a multilayered inventory management software which pledges to revolutionize how inventories are sorted and maintained. However, current inventory management software ...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"26 47","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the effort that was conducted to promote K-12 Computer Science Education in rural region of IL-MO-IA tri-state area from 2016 to 2019. Computational, logic thinking and problem...
{"title":"An effort on promoting K-12 computer science education in rural region","authors":"Lijiang","doi":"10.5555/3447080.3447094","DOIUrl":"https://doi.org/10.5555/3447080.3447094","url":null,"abstract":"This paper describes the effort that was conducted to promote K-12 Computer Science Education in rural region of IL-MO-IA tri-state area from 2016 to 2019. Computational, logic thinking and problem...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Criminals continue to pose a significant threat on the dark web; a threat that will continue for decades. As cybersecurity professionals, we often hear and read about many forms of breached data fo...
{"title":"Resolving dark web identities","authors":"KohyBabur","doi":"10.5555/3447080.3447123","DOIUrl":"https://doi.org/10.5555/3447080.3447123","url":null,"abstract":"Criminals continue to pose a significant threat on the dark web; a threat that will continue for decades. As cybersecurity professionals, we often hear and read about many forms of breached data fo...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126197333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although the COVID-19 is still as complicated as ever, it is a significant job for private networks across the globe to gather and share data in the light of the battle against coronavirus. The sca...
{"title":"Towards understanding privacy trade-off in an epidemic","authors":"TalukderSajedul","doi":"10.5555/3447080.3447111","DOIUrl":"https://doi.org/10.5555/3447080.3447111","url":null,"abstract":"Although the COVID-19 is still as complicated as ever, it is a significant job for private networks across the globe to gather and share data in the light of the battle against coronavirus. The sca...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The utilization of neural networks has increased dramatically over the past decade, and yet our understanding of the effects of different network characteristics on efficacy is limited. Network arc...
在过去的十年中,神经网络的应用急剧增加,但我们对不同网络特征对疗效的影响的理解有限。网络电…
{"title":"Optimizing neural network architecture through a coarse genetic algorithm","authors":"MalloryLogan, SevkliAise","doi":"10.5555/3447286.3447295","DOIUrl":"https://doi.org/10.5555/3447286.3447295","url":null,"abstract":"The utilization of neural networks has increased dramatically over the past decade, and yet our understanding of the effects of different network characteristics on efficacy is limited. Network arc...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"99 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120882152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we discuss the use of cloud-based file storage for backing up and restoring a mobile application database. Google Firebase is employed as the cloud service, SQLite is leveraged on the...
{"title":"Integrating mobile relational databases and cloud-based file storage","authors":"SjodinRobert, MasonRobert, LotfyMohamed","doi":"10.5555/3447065.3447068","DOIUrl":"https://doi.org/10.5555/3447065.3447068","url":null,"abstract":"In this paper we discuss the use of cloud-based file storage for backing up and restoring a mobile application database. Google Firebase is employed as the cloud service, SQLite is leveraged on the...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A significant number of novices are learning programming using various online resources. Unfortunately, it is highly likely that these first-time learners will encounter obstacles that are too diff...
大量的新手正在使用各种在线资源学习编程。不幸的是,这些第一次学习的人很可能会遇到太困难的障碍……
{"title":"Auto-generated game levels increase novice programmers' engagement","authors":"J. LeeMichael","doi":"10.5555/3447080.3447089","DOIUrl":"https://doi.org/10.5555/3447080.3447089","url":null,"abstract":"A significant number of novices are learning programming using various online resources. Unfortunately, it is highly likely that these first-time learners will encounter obstacles that are too diff...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116136529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In general, computer science majors do not consider K-12 education as a career pathway. A potential reason is a lack of introduction to the career path during their undergraduate careers. In this p...
{"title":"Computational thinking for computer science majors","authors":"C. JamiesonAlan, H. JamiesonLindsay","doi":"10.5555/3447080.3447107","DOIUrl":"https://doi.org/10.5555/3447080.3447107","url":null,"abstract":"In general, computer science majors do not consider K-12 education as a career pathway. A potential reason is a lack of introduction to the career path during their undergraduate careers. In this p...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128763696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Credit card fraud has been a noted security issue that requires financial organizations to improve their fraud detection system continuously. In most cases, a credit transaction dataset is expected...
{"title":"Credit card fraud detection","authors":"XiaRan, AlshameriFaleh","doi":"10.5555/3447080.3447101","DOIUrl":"https://doi.org/10.5555/3447080.3447101","url":null,"abstract":"Credit card fraud has been a noted security issue that requires financial organizations to improve their fraud detection system continuously. In most cases, a credit transaction dataset is expected...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114332857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A good computer programmer should have a skill of identifying a problem, developing an effective algorithm to solve it, and convert that algorithm to a program using syntax and semantics previously...
{"title":"Improving teaching and learning of computer programming through SL","authors":"SaeedImad Al","doi":"10.5555/3447286.3447306","DOIUrl":"https://doi.org/10.5555/3447286.3447306","url":null,"abstract":"A good computer programmer should have a skill of identifying a problem, developing an effective algorithm to solve it, and convert that algorithm to a program using syntax and semantics previously...","PeriodicalId":213828,"journal":{"name":"Journal of Computing Sciences in Colleges","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}