Computer Science And The Different Scientific Domains Essay

Length: 5 pages Sources: 5 Subject: Engineering Type: Essay Paper: #38168231 Related Topics: Biological Engineering, Biomedical Engineering, Human Computer Interaction, Computer Games
Excerpt from Essay :

¶ … computer science and the different scientific domains at MIT

Fortunately for myself, MIT's computer science division is closely related to many other scientific divisions in that institution. MIIT's Electrical Engineering and Computer Science Department offer students the opportunity to interface between Computer Sciences and the Life sciences so exposure in this field may open me up to the disciplines of (amongst other areas) computational biology, synthetic biology, medical image analysis, bioinformatics, and computer assisted surgery.

Since an impressive amount of MIT Laboratories (associated with different scientific domains) are connected to computer science, I will focus only on those that particularly interest me:

Berwick's laboratory where applied mathematical and modeling principals are investigated in order to develop computer models for biological systems such as DNA and genotype testing. Computational mathematic models are used in order to gain a deeper insight into the complexities of interaction of genes with the cellular environment and with their properties. Evolutionary components are also investigated.

2. Demaine's laboratory ( which focuses on algorithms, data structures and geometry as its modus operands of research.

3. Gifford's laboratory that integrates computer science with understanding gene expression programs in living cells in order to control and regulate their function. Leading research seems to have been conducted in this laboratory (such as constructive models of the yeast cell cycle and involvement of diabetes-related transcription factors with human pancreas and liver). This is exciting work since it may generate greater understanding into various terminal diseases that still remain unknown and may expand knowledge of embryonic stem cells research for treatment of these debilitating diseases.

4. Golland's laboratory uses computer science as a means of elucidating and analyzing various biological processes. Doing so stretches the boundaries of medical and biological domains. Current research areas include developing techniques for characterizing biological shape and its variability invaluable in various domains such as from modeling cortical folding in neonatal brains to understanding how genetic perturbations affect the appearance end behavior of cells.

Another areas of research involves functional MRI, which is at the forefront of all neuroscientific related fields from
Computational anatomy helps researchers extract differences in organic structures and shapes between various populations thus, for instance, assessing them in identifying new examples and in isolating significant differences in shape models in, for instance schizophrenia, Alzheimer's
disease, and other neurological disorders.

5. Guttag's laboratory integrates computer science with developing systems to better help manage and monitor chronic conditions. Computer science can help in exposing the medical caregiver to enhanced knowledge of medicine that is, otherwise, difficult for him or her to reach since, many times, unknown or inaccessible. Guttag believes that computational technologies and systems will make the practice of medicine "more effective, safer, and more efficient" (EECS: MIT: Department of Electrical Engineering and Computer Science) and his team works towards that end.

6. Knight's laboratory differs to the preceding ones in that he focuses on synthetic biology i.e. To the "development of biology as an engineering discipline" (ibid.). Applied, in the past, to physics, his laboratory is currently working on applying the same tools to biology where computational engineering will simulate design and construction of functional, artificial, living systems.

7. Massaquoi seeks to develop engineering models of human movement control systems. His purposes are triple: to increase scientific understanding of these systems; to provide enhanced insight into neurological disorders; and in order to design biomimetic artificial systems, for instance humanoid robots.

8. Stultz's laboratory focuses on understanding conformational changes in biomolecules that play an important role in common human disease. Innovative methods are employed to that end in order to gain understanding into the role that molecular structures play in the progression of human disease. Insight can help doctors and scientists better treat and monitor particular diseases.

As stated these are just a few of the divisions in MIT that…

Sources Used in Documents:


School of Music. Combined Major in Music and Computer Science. Univ. Of Victoria

Csikszentmihalyi, M. (1991). Flow. N.Y., USA: Harper & Row.

Csikszentmihalyi, M. & Mei-Ha Wong, M. (1991). The situational and personal correlates of happiness: A cross-national comparison. In F. Strack, M. Argyle, & N. Schwartz (Eds.) Subjective well being: An interdisciplinary perspective (pp. 193-212). Oxford & New York: Pergammon Press.

Cite this Document:

"Computer Science And The Different Scientific Domains" (2011, July 20) Retrieved June 13, 2021, from

"Computer Science And The Different Scientific Domains" 20 July 2011. Web.13 June. 2021. <>

"Computer Science And The Different Scientific Domains", 20 July 2011, Accessed.13 June. 2021,

Related Documents
Computer Clustering Involves the Use of Multiple
Words: 2319 Length: 8 Pages Topic: Education - Computers Paper #: 54692503

Computer clustering involves the use of multiple computers, typically personal computers (PCs) or UNIX workstations, multiple storage devices, and redundant interconnections, to form what appears to users as a single integrated system (Cluster computing). Clustering has been available since the 1980s when it was used in Digital Equipment Corp's VMS systems. Today, virtually all leading hardware and software companies including Microsoft, Sun Microsystems, Hewlett Packard and IBM offer clustering technology.

Mris Legal and Scientific Review
Words: 5397 Length: 20 Pages Topic: Criminal Justice Paper #: 2692818

There are three types of stimuli used, which are: 1) Targets; 2) Irrelevant; and 3) Probes. These are used "in the form of words, pictures, or sounds..." which a computer presents for a second or even a partial second. Incoming stimulus, if it is worth noting, results in a P-300, which is an electrical brain response. The P-300 is part of a MERMER or a memory and encoding related multifaceted electroencephalographic response,

Explosive Impacts of Computer and Information Technology
Words: 3234 Length: 10 Pages Topic: Engineering Paper #: 34311157

Explosive impacts of computer and information technology on business and individuals have generated a need to design and develop new computer and software system to incorporate a rapid growing range of computer applications. Software engineers apply the software engineering principles and techniques to design, evaluate, test and implement software systems to enable computer to perform different applications. Software engineers use systematic and quantified approach to design, evaluate, implement software and

Gender Gap and Science for
Words: 2330 Length: 6 Pages Topic: Engineering Paper #: 81299505

Research professionals find two principal groups of gender barriers that confront women in the science and technology classroom: disabling stereotypes regarding gender suitable behavior, and explicit and implicit gender partialities inside the classroom. In every category of gender barriers are present several practices that cumulatively dishearten women from joining these nontraditional spheres. (an Educator's Guide to Gender Bias Issues) Research professionals indicate that children possess an internal belief system regarding

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Pages Topic: Business - Management Paper #: 8293866

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Nature of Science Even in
Words: 595 Length: 2 Pages Topic: Business - Ethics Paper #: 97594194

Smith notes that it may be impossible to unequivocally prove something with one hundred percent accuracy; rather, scientists seek probability. The term theory is often misconstrued: Smith states that "theories always explain facts." Moreover, there is no clear demarcation between a theory and a hypothesis. Theories are basically broad hypotheses. Laws, on the other hand, are more restrictive and are often derived from theories. The practice of science entails experimentation