Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (37)
- Library and Information Science (27)
- Information Security (25)
- Graphics and Human Computer Interfaces (22)
- Education (17)
-
- Artificial Intelligence and Robotics (16)
- Databases and Information Systems (15)
- Engineering (13)
- Other Computer Sciences (13)
- Software Engineering (13)
- Arts and Humanities (12)
- Theory and Algorithms (11)
- Curriculum and Instruction (10)
- Programming Languages and Compilers (9)
- Art and Design (7)
- Computer Engineering (7)
- Data Science (7)
- Business (6)
- Game Design (6)
- Numerical Analysis and Scientific Computing (6)
- Archival Science (5)
- Life Sciences (5)
- Management Sciences and Quantitative Methods (5)
- Mathematics (5)
- Electrical and Computer Engineering (4)
- Higher Education (4)
- OS and Networks (4)
- Physics (4)
- Institution
-
- City University of New York (CUNY) (29)
- Selected Works (28)
- SelectedWorks (9)
- University of Lynchburg (7)
- University of Nebraska at Omaha (7)
-
- Arkansas Tech University (6)
- Colby College (6)
- Ursinus College (5)
- Loyola University Chicago (4)
- Hope College (3)
- Kennesaw State University (3)
- Minnesota State University Moorhead (3)
- Illinois Math and Science Academy (2)
- Nova Southeastern University (2)
- Old Dominion University (2)
- San Jose State University (2)
- The University of San Francisco (2)
- University of Washington Tacoma (2)
- Arcadia University (1)
- Augustana College (1)
- Bridgewater College (1)
- California Polytechnic State University, San Luis Obispo (1)
- Clemson University (1)
- DePaul University (1)
- Eastern Kentucky University (1)
- Elizabethtown College (1)
- Georgia Southern University (1)
- James Madison University (1)
- Liberty University (1)
- Olivet Nazarene University (1)
- Keyword
-
- Cybersecurity (19)
- CS1 (3)
- Computational thinking (3)
- Computer science (3)
- Personality (3)
-
- Student research (3)
- Collaboration (2)
- English (2)
- Extraversion (2)
- Game design (2)
- ICT for Development and Poverty Alleviation (2)
- Introversion (2)
- K-12 (2)
- Presentations (2)
- Programming (2)
- Python (2)
- R programming language (2)
- Retention (2)
- Sentiment analysis (2)
- Social media (2)
- Twitter (2)
- Undergraduate (2)
- Visualization (2)
- Web development (2)
- AI Decision Making (1)
- API (1)
- AVED (1)
- Abm (1)
- Accessibility (1)
- Active learning (1)
- Publication Year
- Publication
-
- Open Educational Resources (22)
- Amber Settle (19)
- Publications and Research (7)
- Student Scholar Showcase (7)
- UNO Student Research and Creative Activity Fair (7)
-
- ATU Research Symposium (6)
- CLAS: Colby Liberal Arts Symposium (6)
- Mathematics and Computer Science Presentations (4)
- Computer Science: Faculty Publications and Other Works (3)
- Jason A Bengtson (3)
- Student Academic Conference (3)
- Yuliya Lierler (3)
- 11th Annual Celebration of Undergraduate Research and Creative Performance (2012) (2)
- Computer Science Faculty Publications (2)
- Creative Activity and Research Day - CARD (2)
- Dr Deogratias Harorimana (2)
- Inaugural CSU IR Conference, 2015 (2)
- Professional Learning Day (2)
- Symposium of Student Scholars (2)
- TAC Talks (2)
- 10th Annual Celebration of Undergraduate Research and Creative Performance (2011) (1)
- 2017 Academic High Altitude Conference (1)
- ASA Multidisciplinary Research Symposium (1)
- ASPIRE 2024 (1)
- Amanda Hartman McLellan (1)
- Associate Professor Katina Michael (1)
- CCE Faculty Proceedings, Presentations, Speeches and Lectures (1)
- Capstone Showcase (1)
- Celebration of Learning (1)
- Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI (1)
- Publication Type
Articles 31 - 60 of 141
Full-Text Articles in Computer Sciences
Javafx Application, Pengfei Huang
Javafx Application, Pengfei Huang
Student Academic Conference
Developing java GUI application by using JavaFX.
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Publications and Research
The motivation of the project is to identify the legislators who voted frequently against their party in terms of their roll call votes using Office of Clerk U.S. House of Representatives Data Sets collected in 2018 and 2019. We construct a model to predict the parties of legislators based on their votes. The method we used is Decision Tree from Data Mining. Python was used to collect raw data from internet, SAS was used to clean data, and all other calculations and graphical presentations are performed using the R software.
Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "1: Introduction & State of Cybersecurity" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "2: Cybersecurity Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "7-8: Risk Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "5: Intro to Web Applications I" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "3-4: Networking Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "9-10: Data Protection & Cryptography" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "14: Business Continuity & Disaster Recovery" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - "Overview" delivered at Baruch College in Spring 2020 by Royce Kok and B. Madhusudan as part of the NYC Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "13: Patching & Vulnerability Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 2 for CIS 4400: Data Warehousing (Spring 2020)
Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "15: Application Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "11: Identity & Access Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "18-19: Anatomy of a Breach" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "12: Network & Endpoint Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton
Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton
UNO Student Research and Creative Activity Fair
Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …
Arduino Microcontrollers In The Classroom: Teaching How To Phrase Effective Science Questions And How To Answer Them With Original Data, Tony Dinsmore
Arduino Microcontrollers In The Classroom: Teaching How To Phrase Effective Science Questions And How To Answer Them With Original Data, Tony Dinsmore
Science and Engineering Saturday Seminars
Arduino microcontrollers in the classroom: teaching how to phrase effective science questions and how to answer them with original data. Prof. Tony Dinsmore, UMass Physics This workshop will develop course modules that address a challenge in the science curriculum: how do we teach basic problem-solving and curiosity-based research skills in a classroom setting? The standard science curriculum teaches concepts and theory quite well but leaves rather little opportunity for students to take the lead in designing and implementing their own investigations. The workshop will use the Arduino, an inexpensive microcontroller that is simple to set up. A huge range of …
Public Interest Technology: Coding For The Public Good, Devorah Kletenik
Public Interest Technology: Coding For The Public Good, Devorah Kletenik
Open Educational Resources
These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.
Accessibility: The Whys And The Hows, Devorah Kletenik
Accessibility: The Whys And The Hows, Devorah Kletenik
Open Educational Resources
This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.
Security Camera Using Raspberry Pi, Tejendra Khatri
Security Camera Using Raspberry Pi, Tejendra Khatri
Student Academic Conference
Making a security camera using raspberry pi utilizing OpenCV for facial recognition, upper body recognition or full-body recognition
Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner
Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner
Capstone Showcase
The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
Publications and Research
One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Eric A. Kowalik
System Projector: An Automatic Program Rewriting Tool For Non-Ground Answer Set Programs, Yuliya Lierler