Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

MS Powerpoint

2020

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 29 of 29

Full-Text Articles in Computer Sciences

Responsive Web Design, Ashley Varon, David Karlins Dec 2020

Responsive Web Design, Ashley Varon, David Karlins

Publications and Research

Responsive web design is one of the most important topics in web. It can be one of the main reasons a website can be costing a business clients, and creating an effect on a business. The rise in popularity of mobile phones and tablets makes it crucial for a website to be designed to respond and adjust to different viewports. This project will research how important responsive web design is in 2020 and the positive or negative impacts it may have on the users, customers, and businesses. Companies must consider text size, layout, navigation, image sizes, and testing when designing …


Geometry Aided Sonification, Michael Tecce Jul 2020

Geometry Aided Sonification, Michael Tecce

Mathematics and Computer Science Presentations

Sonification is the process of deriving an audio representation of a time series which conveys important information about that time series. Otology and vision science have established that humans process audio information more quickly than visual information, and sonification can convey data to the visually impaired. In our work, we implement pipelines using Python/Numpy, and we handle both ordinary 1D time series and multivariate time series. For 1D time series, we find that using data to modulate the pitch or timing of preselected sounds (such as sine waves) simply and effectively captures repeating patterns and anomalies/outliers within the data. To …


Javafx Application, Pengfei Huang May 2020

Javafx Application, Pengfei Huang

Student Academic Conference

Developing java GUI application by using JavaFX.


Decision Tree For Predicting The Party Of Legislators, Afsana Mimi May 2020

Decision Tree For Predicting The Party Of Legislators, Afsana Mimi

Publications and Research

The motivation of the project is to identify the legislators who voted frequently against their party in terms of their roll call votes using Office of Clerk U.S. House of Representatives Data Sets collected in 2018 and 2019. We construct a model to predict the parties of legislators based on their votes. The method we used is Decision Tree from Data Mining. Python was used to collect raw data from internet, SAS was used to clean data, and all other calculations and graphical presentations are performed using the R software.


Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "1: Introduction & State of Cybersecurity" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "2: Cybersecurity Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "7-8: Risk Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "5: Intro to Web Applications I" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "3-4: Networking Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "9-10: Data Protection & Cryptography" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "14: Business Continuity & Disaster Recovery" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps Apr 2020

Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - "Overview" delivered at Baruch College in Spring 2020 by Royce Kok and B. Madhusudan as part of the NYC Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "13: Patching & Vulnerability Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps Apr 2020

Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture 2 for CIS 4400: Data Warehousing (Spring 2020)


Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "15: Application Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "11: Identity & Access Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "18-19: Anatomy of a Breach" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "12: Network & Endpoint Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton Mar 2020

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

UNO Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …


Arduino Microcontrollers In The Classroom: Teaching How To Phrase Effective Science Questions And How To Answer Them With Original Data, Tony Dinsmore Jan 2020

Arduino Microcontrollers In The Classroom: Teaching How To Phrase Effective Science Questions And How To Answer Them With Original Data, Tony Dinsmore

Science and Engineering Saturday Seminars

Arduino microcontrollers in the classroom: teaching how to phrase effective science questions and how to answer them with original data. Prof. Tony Dinsmore, UMass Physics This workshop will develop course modules that address a challenge in the science curriculum: how do we teach basic problem-solving and curiosity-based research skills in a classroom setting? The standard science curriculum teaches concepts and theory quite well but leaves rather little opportunity for students to take the lead in designing and implementing their own investigations. The workshop will use the Arduino, an inexpensive microcontroller that is simple to set up. A huge range of …


Public Interest Technology: Coding For The Public Good, Devorah Kletenik Jan 2020

Public Interest Technology: Coding For The Public Good, Devorah Kletenik

Open Educational Resources

These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.


Accessibility: The Whys And The Hows, Devorah Kletenik Jan 2020

Accessibility: The Whys And The Hows, Devorah Kletenik

Open Educational Resources

This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.


Security Camera Using Raspberry Pi, Tejendra Khatri Jan 2020

Security Camera Using Raspberry Pi, Tejendra Khatri

Student Academic Conference

Making a security camera using raspberry pi utilizing OpenCV for facial recognition, upper body recognition or full-body recognition


Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner Jan 2020

Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner

Capstone Showcase

The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …