Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Data Science (2)
- Numerical Analysis and Scientific Computing (2)
- Social and Behavioral Sciences (2)
- Applied Mathematics (1)
- Categorical Data Analysis (1)
-
- Climate (1)
- Graphics and Human Computer Interfaces (1)
- Information Security (1)
- Library and Information Science (1)
- Models and Methods (1)
- Oceanography and Atmospheric Sciences and Meteorology (1)
- Physics (1)
- Political Science (1)
- Quantum Physics (1)
- Statistical Models (1)
- Statistics and Probability (1)
- Keyword
Articles 1 - 7 of 7
Full-Text Articles in Computer Sciences
From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus
From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus
Publications and Research
Computer interconnection can link different networks by using electrical artificial flow ways that can travel through different connections. these are called data network which travels through different sectors of the network simulation of service computer network using artificial intelligence to enhanced further understanding the computations, I've also demonstrated knowing by using the network to get better understanding of how ethical computing can be learned through universities and collegiate that can help established knowledge and healthy computer information. The main tools for the research are using data networking, ethical learning and translation towards different computer systems.
Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery
Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery
Publications and Research
Since we are living in a digital age, the need to protect ourselves and those who are vulnerable to cyber-attacks is paramount to prevent cyber attacks that steal information such as banking accounts and important sensitive information.
Our research team extensively investigated the five aspects of cybersecurity such as identity, protection, detection, and response. By conducting various interviews with cybersecurity professionals, we gathered information about these five aspects for example security intelligence or security operations and response, (thread hunting, response orchestration) identity access management, (identity management, and data protection), and risks (risk perspective). Our main goal is to look into …
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Publications and Research
•A wildfire is an unplanned, unwanted, uncontrolled fire in an area of combustible vegetation starting in rural areas and urban areas. •Recent studies have shown that the effect of anthropogenic climate change has fueled the wildfire events, leading to an increase in the annual burned areas and number of events. •California is one of the places having the most deadliest and destructive wildfire seasons. With the global warming effect of 1°C since 1850, the 20 largest wildfires events that have occurred in California, 8 of them were in 2017. (Center For Climate And Energy Solutions) •Climate change is primarily caused …
Responsive Web Design, Ashley Varon, David Karlins
Responsive Web Design, Ashley Varon, David Karlins
Publications and Research
Responsive web design is one of the most important topics in web. It can be one of the main reasons a website can be costing a business clients, and creating an effect on a business. The rise in popularity of mobile phones and tablets makes it crucial for a website to be designed to respond and adjust to different viewports. This project will research how important responsive web design is in 2020 and the positive or negative impacts it may have on the users, customers, and businesses. Companies must consider text size, layout, navigation, image sizes, and testing when designing …
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Publications and Research
The motivation of the project is to identify the legislators who voted frequently against their party in terms of their roll call votes using Office of Clerk U.S. House of Representatives Data Sets collected in 2018 and 2019. We construct a model to predict the parties of legislators based on their votes. The method we used is Decision Tree from Data Mining. Python was used to collect raw data from internet, SAS was used to clean data, and all other calculations and graphical presentations are performed using the R software.
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
Publications and Research
One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.
Quirky, Not Quacky: Quantum Computing For Librarians, Jill Cirasella
Quirky, Not Quacky: Quantum Computing For Librarians, Jill Cirasella
Publications and Research
This slideshow introduces librarians and non-scientists to the relatively young field of quantum computing.