Sunday, June 29, 2008
answer on assigment 2
Answer:
In this technological age, our everyday life was being affected by the rapid change and development of information technology. With this computer science has been the center of most researches of most research and development groups all over the world. The article I have read is all about the research conducted by the research and development department in University of Georgia. They were trying to intersect computer science to almost all branches of sciences addressing the most difficult state in managing data and information as well as in providing algorithm that can be used to get the optimal solutions in any hard problems.
Examples of those researches are the Real Time Systems and Robotics. Real Time System is designed to be used in safety critical applications such as autopilot systems and powerplant controllers, and this system should be guaranteed to meet the timing requirements. And in Robotics covers the development of image processing of video camera inputs for decision making, and the approach of controller configuration for automatic behavior specifications. This is only a few of all the computer research conducted by University of Georgia. And we can see that the application of computer science have been a big step to any field of specialties, from a traditional state of processes to a more automated and systematic one, promising a great chance for progress and expansion of each field in terms of their capability and scope.
Below are the lists of research areas in University of Georgia Research Department:
Algorithms and Combinatorics
Artificial Intelligence
Bioinformatics and Health Informatics
Compilers
Computational Genetics
Computational Intelligence
Computer Vision and Image Processing
Computer Networks
Databases and Distributed Computer Systems
Parallel and Distributed Computing
Parallel Processing
Real-Time Systems
Robotics
Scientific Computation
Semantic Web and Semantic Web Processes
Simulation
Operating Systems
Reference:
http://www.cs.uga.edu/research/index.htm#top
Sunday, June 22, 2008
Reflection on 3 scientific paper
Archeological Scientific Research” we can already know what the study is all about. It basically explained the effect of Information Technology in Archeology. Archeology without IT is not that wide since archeological information are limited only for those who have a copy of it either a book or any printed out documents. Furthermore, limited numbers of pages are printed due to a very expensive printing cost during that time. The only advantage of the traditional way of gathering archeological information is its reliability.
Applying Information Technology in Archeology offers so many advantages. The internet is capable to transmit and transfer large amount of data, making it available to possible user anytime at anywhere. The internet will be a very legitimate resource of information since it offers no limitations in providing that information. But the question in data reliability arise, since archeological information can easily be altered and edited by any user who have been granted an access to that information once it has been shared in the internet.
Reference:
Hermon, Sorin
Ben Gurion University of the Negev, Beer-Sheva, Israel
sorinh@bgumail.bgu.ac.il
Franco Niccolucci
University of Florence, Italy
niccolucci@unifi.it
The harm caused by these viruses is measured through its ability to replicate and how it can be passed from one computer to other computer. To avoid our system to more destructive capabilities of viruses, early detection is still the better way. Computer user has a responsibility to protect the computer from these viruses by being able to detect and identify it in early age, to get rid from most harsh to happen in our computer system.
The spread of these viruses is still depend on the ethical aspects in which the primary factor to influenced it even if we say that availability of all resources in transmitting viruses is accessible to anyone. Thus, laws and ethical considerations are still a solution to minimize this unethical act.
Its sad to know that there's such virus as undetectable virus, but still as a computer user we can think an alternative on how to avoid that undetectable virus to enter to our computer.
Reference:
David M. Chess and Steve R. White
IBM Thomas J. Watson Research Center
Hawthorne, New York, USA
chess@us.ibm.com, srwhite@us.ibm.comR
hi guys!!!!
Before anything else let me introduce myself first, I’m Norma Galua, but I used to be called with my nickname ‘Nhorms’. I am a BSIT student of
What I want and what I’m trying to do is to provide you not only the information but also the lessons behind it that anyone can apply in any aspects of life or maybe provide a little help in any decision we may have upon reading my ‘postings’. Anyway my blog’s name is derived from the French word ‘joie de vivre’ which means joy of living, This describes one part of me as a person, my desire to live my life to the fullest.