Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Computer Sciences

From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus Dec 2022

From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus

Publications and Research

Computer interconnection can link different networks by using electrical artificial flow ways that can travel through different connections. these are called data network which travels through different sectors of the network simulation of service computer network using artificial intelligence to enhanced further understanding the computations, I've also demonstrated knowing by using the network to get better understanding of how ethical computing can be learned through universities and collegiate that can help established knowledge and healthy computer information. The main tools for the research are using data networking, ethical learning and translation towards different computer systems.


Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery Jul 2022

Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery

Publications and Research

Since we are living in a digital age, the need to protect ourselves and those who are vulnerable to cyber-attacks is paramount to prevent cyber attacks that steal information such as banking accounts and important sensitive information.

Our research team extensively investigated the five aspects of cybersecurity such as identity, protection, detection, and response. By conducting various interviews with cybersecurity professionals, we gathered information about these five aspects for example security intelligence or security operations and response, (thread hunting, response orchestration) identity access management, (identity management, and data protection), and risks (risk perspective). Our main goal is to look into …


Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang Dec 2021

Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang

Publications and Research

•A wildfire is an unplanned, unwanted, uncontrolled fire in an area of combustible vegetation starting in rural areas and urban areas. •Recent studies have shown that the effect of anthropogenic climate change has fueled the wildfire events, leading to an increase in the annual burned areas and number of events. •California is one of the places having the most deadliest and destructive wildfire seasons. With the global warming effect of 1°C since 1850, the 20 largest wildfires events that have occurred in California, 8 of them were in 2017. (Center For Climate And Energy Solutions) •Climate change is primarily caused …


Responsive Web Design, Ashley Varon, David Karlins Dec 2020

Responsive Web Design, Ashley Varon, David Karlins

Publications and Research

Responsive web design is one of the most important topics in web. It can be one of the main reasons a website can be costing a business clients, and creating an effect on a business. The rise in popularity of mobile phones and tablets makes it crucial for a website to be designed to respond and adjust to different viewports. This project will research how important responsive web design is in 2020 and the positive or negative impacts it may have on the users, customers, and businesses. Companies must consider text size, layout, navigation, image sizes, and testing when designing …


Decision Tree For Predicting The Party Of Legislators, Afsana Mimi May 2020

Decision Tree For Predicting The Party Of Legislators, Afsana Mimi

Publications and Research

The motivation of the project is to identify the legislators who voted frequently against their party in terms of their roll call votes using Office of Clerk U.S. House of Representatives Data Sets collected in 2018 and 2019. We construct a model to predict the parties of legislators based on their votes. The method we used is Decision Tree from Data Mining. Python was used to collect raw data from internet, SAS was used to clean data, and all other calculations and graphical presentations are performed using the R software.


Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "1: Introduction & State of Cybersecurity" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "2: Cybersecurity Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "7-8: Risk Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "5: Intro to Web Applications I" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "3-4: Networking Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "9-10: Data Protection & Cryptography" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "14: Business Continuity & Disaster Recovery" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps Apr 2020

Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - "Overview" delivered at Baruch College in Spring 2020 by Royce Kok and B. Madhusudan as part of the NYC Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "13: Patching & Vulnerability Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps Apr 2020

Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture 2 for CIS 4400: Data Warehousing (Spring 2020)


Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "15: Application Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "11: Identity & Access Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "18-19: Anatomy of a Breach" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "12: Network & Endpoint Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Public Interest Technology: Coding For The Public Good, Devorah Kletenik Jan 2020

Public Interest Technology: Coding For The Public Good, Devorah Kletenik

Open Educational Resources

These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.


Accessibility: The Whys And The Hows, Devorah Kletenik Jan 2020

Accessibility: The Whys And The Hows, Devorah Kletenik

Open Educational Resources

This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.


The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto Dec 2019

The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto

Publications and Research

One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.


Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng Jun 2019

Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng

Open Educational Resources

No abstract provided.


Quirky, Not Quacky: Quantum Computing For Librarians, Jill Cirasella Jan 2009

Quirky, Not Quacky: Quantum Computing For Librarians, Jill Cirasella

Publications and Research

This slideshow introduces librarians and non-scientists to the relatively young field of quantum computing.