Sunday, June 29, 2008

answer on assigment 2

Find any information/article and examine the state of computer science and its variety if technical topics.

Answer:

In this technological age, our everyday life was being affected by the rapid change and development of information technology. With this computer science has been the center of most researches of most research and development groups all over the world. The article I have read is all about the research conducted by the research and development department in University of Georgia. They were trying to intersect computer science to almost all branches of sciences addressing the most difficult state in managing data and information as well as in providing algorithm that can be used to get the optimal solutions in any hard problems.

Examples of those researches are the Real Time Systems and Robotics. Real Time System is designed to be used in safety critical applications such as autopilot systems and powerplant controllers, and this system should be guaranteed to meet the timing requirements. And in Robotics covers the development of image processing of video camera inputs for decision making, and the approach of controller configuration for automatic behavior specifications. This is only a few of all the computer research conducted by University of Georgia. And we can see that the application of computer science have been a big step to any field of specialties, from a traditional state of processes to a more automated and systematic one, promising a great chance for progress and expansion of each field in terms of their capability and scope.

Below are the lists of research areas in University of Georgia Research Department:
Algorithms and Combinatorics
Artificial Intelligence
Bioinformatics and Health Informatics
Compilers
Computational Genetics
Computational Intelligence
Computer Vision and Image Processing
Computer Networks
Databases and Distributed Computer Systems
Parallel and Distributed Computing
Parallel Processing
Real-Time Systems
Robotics
Scientific Computation
Semantic Web and Semantic Web Processes
Simulation
Operating Systems

Reference:
http://www.cs.uga.edu/research/index.htm#top

Sunday, June 22, 2008

Reflection on 3 scientific paper

THE IMPACT OF SHARED INFORMATION TECHNOLOGY ON ARCHEOLOGICAL SCIENTIFIC RESEARCH


From the title alone “The Impact of Shared Information Technology on
Archeological Scientific Research” we can already know what the study is all about. It basically explained the effect of Information Technology in Archeology. Archeology without IT is not that wide since archeological information are limited only for those who have a copy of it either a book or any printed out documents. Furthermore, limited numbers of pages are printed due to a very expensive printing cost during that time. The only advantage of the traditional way of gathering archeological information is its reliability.

Applying Information Technology in Archeology offers so many advantages. The internet is capable to transmit and transfer large amount of data, making it available to possible user anytime at anywhere. The internet will be a very legitimate resource of information since it offers no limitations in providing that information. But the question in data reliability arise, since archeological information can easily be altered and edited by any user who have been granted an access to that information once it has been shared in the internet.

Reference:
Hermon, Sorin

Ben Gurion University of the Negev, Beer-Sheva, Israel
sorinh@bgumail.bgu.ac.il
Franco Niccolucci
University of Florence, Italy
niccolucci@unifi.it



TECHNOLOGICALLY ENABLED CRIME: SHIFTING PARADIGMS FOR THE YEAR 2000

This study is all about the effect of viruses and other malicious files to our computer and computer system. These viruses are intentionally designed and created for a very particular reason which is to destroy one application or the entire computer system. The present technologies offer all means in transmitting viruses from one computer to another via virus exchange network. This is that causes the creation of so many viruses.
The harm caused by these viruses is measured through its ability to replicate and how it can be passed from one computer to other computer. To avoid our system to more destructive capabilities of viruses, early detection is still the better way. Computer user has a responsibility to protect the computer from these viruses by being able to detect and identify it in early age, to get rid from most harsh to happen in our computer system.
The spread of these viruses is still depend on the ethical aspects in which the primary factor to influenced it even if we say that availability of all resources in transmitting viruses is accessible to anyone. Thus, laws and ethical considerations are still a solution to minimize this unethical act.
Reference:
Sarah Gordon
sgordon@low-level.format.com



AN UNDETECTABLE COMPUTER VIRUS

As a computer user it is our responsibility to protect our computer from viruses and malicious files. One better way to protect our computer system is the ability to detect the virus from its early stage. There are already several detection algorithms available to used for early detection and identifying of viruses. But there is really a case that there’s no way to detect a particular virus that said to have no error-free detection algorithm exist. This might be very harmful for our computer system since this undetectable viruses are free to enter and able to destroy our computer system.
Its sad to know that there's such virus as undetectable virus, but still as a computer user we can think an alternative on how to avoid that undetectable virus to enter to our computer.


Reference:
David M. Chess and Steve R. White

IBM Thomas J. Watson Research Center
Hawthorne, New York, USA
chess@us.ibm.com, srwhite@us.ibm.comR

hi guys!!!!

Before anything else let me introduce myself first, I’m Norma Galua, but I used to be called with my nickname ‘Nhorms’. I am a BSIT student of University of Southeastern Philippines and as a part of our curriculum I currently enrolled in CS Research Methods, in which we are required to post all our assignments, reports and step by step development of our individual research as our final requirements in this subject. In relation with this, my personal blog http://www.joiedevivre.blogspot.com/ will be posting information not only about myself but as well as all the topics and studies that we will be having in this subject for the rest of the semester. In this our discussion will not be limited for us who enrolled with this subject but also to anyone who will visit my blog. And this provides me with additional information to share with you.

What I want and what I’m trying to do is to provide you not only the information but also the lessons behind it that anyone can apply in any aspects of life or maybe provide a little help in any decision we may have upon reading my ‘postings’. Anyway my blog’s name is derived from the French word ‘joie de vivre’ which means joy of living, This describes one part of me as a person, my desire to live my life to the fullest.

Have fun reading guys, hope this is not the first or last time you will visit my blog, coz I have a lot to share with you with my coming ‘postings’.

Maayong Adlaw.