Skip to main content

Computer Science

Section Editor: Maria Virvou

Maria Virvou serves as a Professor and Head of the Department of Informatics, University of Piraeus, Greece.

She is a world expert in the area of Computer Education, Human-Computer Interaction and Knowledge-Based Software Engineering. She also served as the Director of the “Software Engineering” research lab. This Software Engineering lab has achieved honorary distinctions and has been one of the main contributors to establishing the University of Piraeus as a top Organization for Computer Education.

Professor Virvou has authored and/or edited  many books in Computer Science and over 300 research papers which have been published in high quality international journals, books and conference proceedings.

Page 2 of 5

  1. Soft set theory is a mathematical approach that provides solution for dealing with uncertain data. As a standard soft set, it can be represented as a Boolean-valued information system, and hence it has been us...

    Authors: Muhammad Sadiq Khan, Mohammed Ali Al-Garadi, Ainuddin Wahid Abdul Wahab and Tutut Herawan

    Citation: SpringerPlus 2016 5:1348

    Content type: Research

    Published on:

  2. Methods for in silico screening of large databases of molecules increasingly complement and replace experimental techniques to discover novel compounds to combat diseases. As these techniques become more compl...

    Authors: Horacio Pérez-Sánchez, Vahid Rezaei, Vitaliy Mezhuyev, Duhu Man, Jorge Peña-García, Helena den-Haan and Sandra Gesing

    Citation: SpringerPlus 2016 5:1300

    Content type: Research

    Published on:

  3. With the support of cloud computing techniques, social coding platforms have changed the style of software development. Github is now the most popular social coding platform and project hosting service. Softwa...

    Authors: Yan Hu, Jun Zhang, Xiaomei Bai, Shuo Yu and Zhuo Yang

    Citation: SpringerPlus 2016 5:1268

    Content type: Research

    Published on:

  4. The majority of methods for recognizing human actions are based on single-view video or multi-camera data. In this paper, we propose a novel multi-surface video analysis strategy. The video can be expressed as...

    Authors: Hong-Bo Zhang, Qing Lei, Bi-Neng Zhong, Ji-Xiang Du, Jialin Peng, Tsung-Chih Hsiao and Duan-Sheng Chen

    Citation: SpringerPlus 2016 5:1226

    Content type: Research

    Published on:

  5. In crowd behavior studies, a model of crowd behavior needs to be trained using the information extracted from video sequences. Most of the previous methods are based on low-level visual features because there ...

    Authors: Hamidreza Rabiee, Javad Haddadnia and Hossein Mousavi

    Citation: SpringerPlus 2016 5:1179

    Content type: Research

    Published on:

    The Erratum to this article has been published in SpringerPlus 2016 5:2114

  6. The exponential increase in the health-related online reviews has played a pivotal role in the development of sentiment analysis systems for extracting and analyzing user-generated health reviews about a drug ...

    Authors: Muhammad Zubair Asghar, Shakeel Ahmad, Maria Qasim, Syeda Rabail Zahra and Fazal Masud Kundi

    Citation: SpringerPlus 2016 5:1139

    Content type: Research

    Published on:

  7. Parallel computation has been widely applied in a variety of large-scale scientific and engineering applications. Many studies indicate that exploiting both task and data parallelisms, i.e. mixed-parallel work...

    Authors: Kuo-Chan Huang, Wei-Ya Wu, Feng-Jian Wang, Hsiao-Ching Liu and Chun-Hao Hung

    Citation: SpringerPlus 2016 5:1138

    Content type: Research

    Published on:

  8. No-reference image quality assessment aims to predict the visual quality of distorted images without examining the original image as a reference. Most no-reference image quality metrics which have been already...

    Authors: Hongjun Li, Wei Hu and Zi-neng Xu

    Citation: SpringerPlus 2016 5:1097

    Content type: Research

    Published on:

  9. This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and ident...

    Authors: B. Pushpa Devi, Kh. Manglem Singh and Sudipta Roy

    Citation: SpringerPlus 2016 5:1091

    Content type: Research

    Published on:

  10. Various peak models have been introduced to detect and analyze peaks in the time domain analysis of electroencephalogram (EEG) signals. In general, peak model in the time domain analysis consists of a set of s...

    Authors: Asrul Adam, Zuwairie Ibrahim, Norrima Mokhtar, Mohd Ibrahim Shapiai, Paul Cumming and Marizan Mubin

    Citation: SpringerPlus 2016 5:1036

    Content type: Research

    Published on:

  11. A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewa...

    Authors: Ravi Kiran Varma Penmatsa, Valli Kumari Vatsavayi and Srinivas Kumar Samayamantula

    Citation: SpringerPlus 2016 5:1032

    Content type: Research

    Published on:

  12. Covering approximation spaces are a generalization of equivalence-based rough set theories. In this paper, we will consider twelve types of covering based approximation operators by combining four types of cov...

    Authors: Samira Safari and Mohammad Reza Hooshmandasl

    Citation: SpringerPlus 2016 5:1003

    Content type: Research

    Published on:

  13. Formal analysis of functional properties of system requirements needs precise descriptions. However, the stakeholders sometimes describe the system with ambiguous, vague or fuzzy terms, hence formal frameworks...

    Authors: Hong Anh Le, Shin Nakajima and Ninh Thuan Truong

    Citation: SpringerPlus 2016 5:1000

    Content type: Research

    Published on:

  14. Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key param...

    Authors: Gayathri Dhananjayan and Janakiraman Subbiah

    Citation: SpringerPlus 2016 5:995

    Content type: Research

    Published on:

  15. In this paper, we propose a new feature descriptor, named local mesh quantized extrema patterns (LMeQEP) for image indexing and retrieval. The standard local quantized patterns collect the spatial relationship...

    Authors: L. Koteswara Rao, D. Venkata Rao and L. Pratap Reddy

    Citation: SpringerPlus 2016 5:976

    Content type: Research

    Published on:

  16. An increasing number of researchers and practitioners are working to develop smart cities. Considerable attention has been paid to the college campus as it is an important component of smart cities. Consequent...

    Authors: Xin Dong, Xiangjie Kong, Fulin Zhang, Zhen Chen and Jialiang Kang

    Citation: SpringerPlus 2016 5:974

    Content type: Research

    Published on:

    The Erratum to this article has been published in SpringerPlus 2016 5:1767

  17. The contiguous sequences of the terms (N-grams) in the documents are symmetrically distributed among different classes. The symmetrical distribution of the N-Grams raises uncertainty in the belongings of the N...

    Authors: Deepak Agnihotri, Kesari Verma and Priyanka Tripathi

    Citation: SpringerPlus 2016 5:942

    Content type: Research

    Published on:

  18. Orthogonal frequency division multiplexing (OFDM) is the digital modulation technique used by 4G and many other wireless communication systems. OFDM signals have significant amplitude fluctuations resulting in...

    Authors: Nargis Bibi, Anthony Kleerekoper, Nazeer Muhammad and Barry Cheetham

    Citation: SpringerPlus 2016 5:931

    Content type: Research

    Published on:

  19. Editors play a critical role in the peer review system. How do editorial behaviors affect the performance of peer review? No quantitative model to date allows us to measure the influence of editorial behaviors...

    Authors: Wei Wang, Xiangjie Kong, Jun Zhang, Zhen Chen, Feng Xia and Xianwen Wang

    Citation: SpringerPlus 2016 5:903

    Content type: Research

    Published on:

  20. Recently, the compressive tracking (CT) method (Zhang et al. in Proceedings of European conference on computer vision, pp 864–877, 2012) has attracted much attention due to its high efficiency, but it cannot well...

    Authors: Pengpeng Zhao, Shaohui Cui, Min Gao and Dan Fang

    Citation: SpringerPlus 2016 5:849

    Content type: Research

    Published on:

  21. As an important application in optical imaging, palmprint recognition is interfered by many unfavorable factors. An effective fusion of blockwise bi-directional two-dimensional principal component analysis and...

    Authors: Lin Zhai, Shujun Fu, Caiming Zhang, Yunxian Liu, Lu Wang, Guohua Liu and Mingqiang Yang

    Citation: SpringerPlus 2016 5:832

    Content type: Research

    Published on:

  22. Response surface methods via the first or second order models are important in manufacturing processes. This study, however, proposes different structured mechanisms of the vertical transportation systems or V...

    Authors: Pasura Aungkulanon and Pongchanun Luangpaiboon

    Citation: SpringerPlus 2016 5:831

    Content type: Research

    Published on:

  23. Evolutionary music composition is a prominent technique for automatic music generation. The immense adaptation potential of evolutionary algorithms has allowed the realisation of systems that automatically pro...

    Authors: Maximos A. Kaliakatsos-Papakostas, Andreas Floros and Michael N. Vrahatis

    Citation: SpringerPlus 2016 5:826

    Content type: Research

    Published on: