Volume 7, Issue 1

Brain Science and Brain-inspired Artificial Intelligence: Advances and Trends
Original Research
Brain science and brain-inspired artificial intelligence have been very significant areas. They have a wide range of applications including military and defense, intelligent manufacturing, business intelligence and management, medical service and healthcare, etc. Many countries have launched national brain-related projects to increase the national interests and capability in the competitive global world. In this paper, we introduce some concepts, principles, and emerging technologies of brain science and brain-inspired artificial intelligence; present their advances and trends; and outline some challenges in brain-inspired computing and computation based on spiking-neural-networks (SNNs). Specifically, the advances and trends cover brain-inspired computing, neuromorphic computing systems, and multi-scale brain simulation, brain association graph, brainnetome and the connectome, brain imaging, brain-inspired chips and brain-inspired devices, brain-computer interface (BCI) and brain-machine interface (BMI), brain-inspired robotics and applications, quantum robots, and cyborg (human-machine hybrids).
Journal of Computer Sciences and Applications. 2019, 7(1), 56-61. DOI: 10.12691/jcsa-7-1-9
Pub. Date: December 28, 2019
17120 Views15901 Downloads58 Likes
The Effect of Computer Self-Efficacy and Attitude on Undergraduate Students’ Intention to Use Emerging Technology in Classroom Learning
Original Research
Although digital technology is playing an increasingly significant role in education and students are using digital technology in their everyday lives, the use of digital technology in their academic learning is still very limited. The literature indicates that the individual factors, such as computer self-efficacy and attitude, are significant predictors of whether or not individuals intend to use technology. In this context, a research conducted to investigate the effect of undergraduate students’ computer self-efficacy and attitude toward digital technology on their intention to use digital technology in their academic learning. The objective of this research was to examine the effect of individual factors on undergraduate students’ intentions to use innovative digital technology in their academic learning. A survey was conducted on undergraduate students in spring, summer, and fall semesters at a regional campus of a large public university. The research findings support the literature that computer self-efficacy and attitude have significant effects on undergraduate students’ intention to use digital technology in their academic learning. Therefore, both factors should be considered important in the process of implementation of digital technology in undergraduate learning environment. The results from this study will provide educators and administrators in higher educational institutions a better understanding about the undergraduate students’ adoption of digital technology in their learning process.
Journal of Computer Sciences and Applications. 2019, 7(1), 50-55. DOI: 10.12691/jcsa-7-1-8
Pub. Date: December 22, 2019
5216 Views880 Downloads5 Likes
Optimizing Photogrammetric Techniques for Wetlands Monitoring: Southeast Texas
Original Research
Environmentalists express concerns about the health of the planet and the vital role of wetlands on Earth. Sufficient knowledge of wetland changes is becoming more crucial as loss of wetland area increases. However, an ability to efficiently map and monitor the wetland topographies requires technology advancement. Producing high resolution and high quality digital elevation models (DEMs) requires substantial investments in personnel time, hardware, and software while increasing accessibility of three-dimensional imaging methods, such as digital photogrammetry. Further refinements have highly improved the method while preserving its convenience. This study introduces unmanned aerial system (UAS) coupled with with structure-from-motion (SfM) technology as a new method in wetland mapping. The contributions of this study are aimed at maximizing the efficiency and accuracy of the data collection process for mapping the Southeast Texas wetlands and other related applications. This paper serves as a summary and evaluation of various photogrammetric and data extraction techniques.
Journal of Computer Sciences and Applications. 2019, 7(1), 43-49. DOI: 10.12691/jcsa-7-1-7
Pub. Date: October 20, 2019
7791 Views1185 Downloads7 Likes
Critical Infrastructure - Perspectives on the Role of Government in Cybersecurity
Original Research
Since the end of the cold war era (1945 - 1989), the United States government (USG) has been gradually reduced, and in some cases eliminated direct support for the development of critical infrastructure. The reduction of public investment, and the subsequent transfer of critical infrastructure from public to private ownership, has significantly increased the risk not only to critical infrastructure, but to the entire nation. The use of non-isolated, public communication and information technology, without any contingency or emergency backups is a national disaster waiting to happen. The USG must vigorously support - both financially and through active management, policy and regulation - the creation of isolated, secure, and resilient communications and information technology infrastructures, that provide non-public redundancy, thereby ensuring that public communication and information technology failures, as a result of man-made attacks or natural events, do not result in catastrophic outcomes to not only other critical infrastructure sectors, but to the nation at large. This paper surveys historical and contemporary government roles in the development of critical infrastructure, particularly, communication and information technologies, and provides recommendations for how the US government can significantly improve the security and resilience of its current critical infrastructure systems.
Journal of Computer Sciences and Applications. 2019, 7(1), 37-42. DOI: 10.12691/jcsa-7-1-6
Pub. Date: August 12, 2019
9353 Views3208 Downloads7 Likes
Efficient Data Privacy and Security in Autonomous Cars
Design
As the advancement and testing of self-driving auto innovation has advanced, the possibility of exclusive self-ruling vehicles working on open streets is nearing. Industry specialists foresee that self-governing vehicles will be financially accessible inside the following five to ten years. As automation becomes more prevalent in the transportation industry, driverless vehicles are appearing more frequently in the news. Asymmetric algorithms have shown their impact on large amount of data that have been secured by generating a public key. Cyber security is the major concern for any autonomous vehicle. The main contribution of this research is to secure data using an Asymmetric algorithm technique which will be saved in cloud storage.
Journal of Computer Sciences and Applications. 2019, 7(1), 31-36. DOI: 10.12691/jcsa-7-1-5
Pub. Date: May 10, 2019
10080 Views1875 Downloads1 Likes
Illumination-Invariant Face Recognition in Hyperspectral Images
Original Research
Illumination-invariant face recognition remains a challenging problem. Previous studies use either spatial or spectral information to address this problem. In this paper, we propose an algorithm that uses spatial and spectral information simultaneously. We first learn a basis in the spectral domain. We then extract spatial features using 2D Gabor filters. Finally, we use the basis and the spatial features to classify face images. We demonstrate the effectiveness of the algorithm on a database of 200 subjects.
Journal of Computer Sciences and Applications. 2019, 7(1), 21-30. DOI: 10.12691/jcsa-7-1-4
Pub. Date: April 22, 2019
18792 Views2177 Downloads2 Likes
Determining the Employability Skills in Polytechnic Curriculum in Ghana
Original Research
Polytechnics worldwide have the mandate to produce the manpower needs of most industry and also to make students entrepreneurial, equipped with the needed skills to be self-reliant through technical and vocational education and training for sustainable development. The development of curriculum for all the HND programmes seems to be retarding and requires immediate attention to make them relevant and industry-friendly. This paper seeks to review the computer science curriculum of polytechnics in Ghana to determine if students are adequately being prepared with employability skills to build human capital, create jobs and raise labor productivity. An analytical review of computer science curriculum of seven polytechnics was used. The finding shows that the computer science curriculum was skewed more toward theoretical and technical skills with very minimal hands-on industry training due to lack of infrastructure, human resource, lack of collaboration between lecturers and industry, among others in most polytechnics. In conclusion this paper recommends a round table discussion between stakeholders such as NAPTEX (and other regulatory bodies), industry players and polytechnics (lecturers) in the design and implementation (course delivery) of the computer science curriculum to ensure employability of HND graduates.
Journal of Computer Sciences and Applications. 2019, 7(1), 16-20. DOI: 10.12691/jcsa-7-1-3
Pub. Date: March 25, 2019
7128 Views1435 Downloads1 Likes
TV Stream Table of Content: A New Level in the Hierarchical Video Representation
Review Article
With the rapid development of nowadays technologies, TV could keep its position as one of the most important entertainment and sometimes educative utilities in our daily life. However, keeping this position required a lot of major changes to take place in order for the TV to follow up with the digital revolution, such as, digital broadcasting, High Definition TV, TV on demand. TV-REPLAY, WebTV, etc. This evolution accompanied with many other factors such as the vast spread of communication means and the low prices of storing media have all resulted in many other indispensable technologies for video content storing, structuring, searching and retrieval. Video content can be of various types: a sequence of frames, a sequence of shots, a sequence of scenes, or a sequence of programs which is what the TV stream is usually composed of. Video content structuring would be of a great benefit to help indexing searching and retrieving information from the content efficiently. For example, structuring a soccer game into Play/Break phases facilitates later the detection of goals or summarizing the soccer video. Another example is to structure a news program into stories where each story is composed of an anchorperson segment followed by a report, which facilitates later the search of a specific story or an intelligent navigation inside the news program. However, all the existing analysis methods are dedicated for one type of video content. Such methods generate very poor results if it is applied on a TV stream that is composed of several video programs. So, it is important to detect a priori the boundaries of each program and then identify the type of each program in order to run the dedicated analysis method based on the type. For a TV viewer, a TV stream is a sequence of programs (P) and breaks (B). Programs may be separated by breaks and may include also breaks. For analysis purpose, the stream can be considered as a sequence of audio and video frames with no markers of the start and end points of the included programs or breaks. Most of TV channels that produce TV streams provide a program guide about the broadcasted programs. However, such guides usually lack precision, especially with the existence of live programs which makes the prediction of their start and end very hard. Moreover, program guides do not include any information about the breaks (i.e. commercials). Hence, one of the important steps to structure TV video content is to segment it into different programs and then choose the appropriate method to segment each program separately based on its type. The TV stream structuring consists in detecting the start and end of all the programs and breaks in the stream and later trying to annotate automatically each program by some metadata that summarizes its content or identifies its type. This step can be performed by analyzing the metadata provided with the stream (EPG or EIT), or analyzing the audio-visual stream itself. In this article, we define what we call TvToC (TV stream table of content) that adds a new level in the hierarchical video decomposition (traditional video ToC). Then, we provide a comparative study of all the methods and techniques in the domain of TV stream segmentation. Besides, a comparison of the different approaches is done to highlight the advantages and the weaknesses of each of them.
Journal of Computer Sciences and Applications. 2019, 7(1), 1-9. DOI: 10.12691/jcsa-7-1-1
Pub. Date: December 28, 2018
8778 Views2236 Downloads1 Likes