Skip to main content

Computer Science

Section Editor: Maria Virvou

Maria Virvou serves as a Professor and Head of the Department of Informatics, University of Piraeus, Greece.

She is a world expert in the area of Computer Education, Human-Computer Interaction and Knowledge-Based Software Engineering. She also served as the Director of the “Software Engineering” research lab. This Software Engineering lab has achieved honorary distinctions and has been one of the main contributors to establishing the University of Piraeus as a top Organization for Computer Education.

Professor Virvou has authored and/or edited  many books in Computer Science and over 300 research papers which have been published in high quality international journals, books and conference proceedings.

Page 4 of 5

  1. Customer satisfaction is the result of product quality and viability. The place of the perceived satisfaction of users/customers for a software product cannot be neglected especially in today competitive marke...

    Authors: Emmanuel O. C. Mkpojiogu and Nor Laily Hashim
    Citation: SpringerPlus 2016 5:197
  2. Aiming to embed large amount of data while minimize the sum of costs of all changed pixels, a novel high capacity data hiding scheme based on (7, 4) Hamming code is realized by a family of algorithms. Firstly, n ...

    Authors: Zekun Cao, Zhaoxia Yin, Honghe Hu, Xiangping Gao and Liangmin Wang
    Citation: SpringerPlus 2016 5:175
  3. The average topological overlap of two graphs of two consecutive time steps measures the amount of changes in the edge configuration between the two snapshots. This value has to be zero if the edge configurati...

    Authors: Kathrin Büttner, Jennifer Salau and Joachim Krieter
    Citation: SpringerPlus 2016 5:165
  4. This paper focuses on the usage of a learning management system in an educational institution for higher education in Greece. More specifically, the paper examines the literature on the use of different learni...

    Authors: Katerina Kabassi, Ioannis Dragonas, Alexandra Ntouzevits, Tzanetos Pomonis, Giorgos Papastathopoulos and Yiannis Vozaitis
    Citation: SpringerPlus 2016 5:101
  5. The advent of online social networks (OSNs) paired with the ubiquitous proliferation of smartphones have enabled social sensing systems. In the last few years, the aptitude of humans to spontaneously collect ...

    Authors: Marco Avvenuti, Mario G. C. A. Cimino, Stefano Cresci, Andrea Marchetti and Maurizio Tesconi
    Citation: SpringerPlus 2016 5:43
  6. This paper provides an overview of the state of the art technologies for software development in cloud environments. The surveyed systems cover the whole spectrum of cloud-based development including integrat...

    Authors: G. Fylaktopoulos, G. Goumas, M. Skolarikis, A. Sotiropoulos and I. Maglogiannis
    Citation: SpringerPlus 2016 5:38
  7. The advent of smartphones and tablets, means that we can constantly get information on our current geographical location. These devices include not only GPS/GNSS chipsets but also mass-market inertial platform...

    Authors: P. Dabove, G. Ghinamo and A. M. Lingua
    Citation: SpringerPlus 2015 4:834
  8. A new blind data hiding scheme is proposed in which data is decomposed using the Fresnelet transform. The inverse Fresnelet transform is performed on decomposed subbands by choosing different key parameters, ...

    Authors: Nazeer Muhammad, Nargis Bibi, Zahid Mahmood and Dai-Gyoung Kim
    Citation: SpringerPlus 2015 4:832
  9. The Euler number of a binary image is an important topological property in computer vision and pattern recognition. This paper proposes a novel bit-quad-based Euler number computing algorithm. Based on graph t...

    Authors: Bin Yao, Lifeng He, Shiying Kang, Yuyan Chao and Xiao Zhao
    Citation: SpringerPlus 2015 4:735
  10. An computer-aided diagnosis system of pathological brain detection (PBD) is important for help physicians interpret and analyze medical images. We proposed a novel automatic PBD to distinguish pathological bra...

    Authors: Yu-Dong Zhang, Shui-Hua Wang, Xiao-Jun Yang, Zheng-Chao Dong, Ge Liu, Preetha Phillips and Ti-Fei Yuan
    Citation: SpringerPlus 2015 4:716
  11. Preservation of privacy in data mining has emerged as an absolute prerequisite for exchanging confidential information in terms of data analysis, validation, and publishing. Ever-escalating internet phishing p...

    Authors: Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh and Mohammad Abdur Razzaque
    Citation: SpringerPlus 2015 4:694
  12. In this paper, we propose a hybrid system based on a modified statistical GMM voice conversion algorithm for improving the recognition of esophageal speech. This hybrid system aims to compensate for the distor...

    Authors: Othman Lachhab, Joseph Di Martino, Elhassane Ibn Elhaj and Ahmed Hammouch
    Citation: SpringerPlus 2015 4:644
  13. In this paper, we examine the issue of strategic industrial location selection in uncertain decision making environments for implanting new industrial corporation. In fact, the industrial location issue is typ...

    Authors: Omar Boutkhoum, Mohamed Hanine, Tarik Agouti and Abdessadek Tikniouine
    Citation: SpringerPlus 2015 4:628
  14. This work presents the dynamic graph cut based Otsu’s method to segment the masses in mammogram images. Major concern that threatens human life is cancer. Breast cancer is the most common type of disease among...

    Authors: S. Pitchumani Angayarkanni, Nadira Banu Kamal and Ranjit Jeba Thangaiya
    Citation: SpringerPlus 2015 4:591
  15. Research on symmetry detection focuses on identifying and detecting new types of symmetry. The paper presents an algorithm that is capable of detecting any type of permutation-based symmetry, including many ty...

    Authors: Peter M Maurer
    Citation: SpringerPlus 2015 4:418
  16. Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular wa...

    Authors: Shin Kamada, Takumi Ichimura, Tetsuya Shigeyasu and Yasuhiko Takemoto
    Citation: SpringerPlus 2014 3:761
  17. The complexity in shape context method and its simplification is addressed. A novel, but simple approach to design shape context method including Fourier Transform for the object recognition is described. Rele...

    Authors: Radhika Mani Madireddy, Pardha Saradhi Varma Gottumukkala, Potukuchi Dakshina Murthy and Satyanarayana Chittipothula
    Citation: SpringerPlus 2014 3:674
  18. While Cluster-Tree network topologies look promising for WSN applications with timeliness and energy-efficiency requirements, we are yet to witness its adoption in commercial and academic solutions. One of the...

    Authors: Ricardo Severino, Nuno Pereira and Eduardo Tovar
    Citation: SpringerPlus 2014 3:493
  19. Recently, many classes of objects can be efficiently detected by the way of machine learning techniques. In practice, boosting techniques are among the most widely used machine learning for various reasons. Th...

    Authors: Ameni Yangui Jammoussi, Sameh Fakhfakh Ghribi and Dorra Sellami Masmoudi
    Citation: SpringerPlus 2014 3:355
  20. Explicit semantic analysis (ESA) utilizes an immense Wikipedia index matrix in its interpreter part. This part of the analysis multiplies a large matrix by a term vector to produce a high-dimensional concept v...

    Authors: Faisal Rahutomo and Masayoshi Aritsugi
    Citation: SpringerPlus 2014 3:149
  21. We describe the vertex collocation profile (VCP) concept. VCPs provide rich information about the surrounding local structure of embedded vertex pairs. VCP analysis offers a new tool for researchers and domain...

    Authors: Ryan N Lichtenwalter and Nitesh V Chawla
    Citation: SpringerPlus 2014 3:116