Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (17)
- Accessibility (1)
- Code cyber (1)
- Coding for public good (1)
- Computation (1)
-
- Computer Science (1)
- Cyber (1)
- Cyber security (1)
- Data Analytics (1)
- Data Science (1)
- Data warehousing (1)
- Disabilities (1)
- Discussion (1)
- NYC Tech-in-Residence Corps (1)
- Online (1)
- Public interest technology (1)
- Quantum computing (1)
- Quantum information (1)
- Responsive design (1)
- Security (1)
- UI (1)
- Viewports (1)
- Web (1)
- Web development (1)
Articles 1 - 29 of 29
Full-Text Articles in Physical Sciences and Mathematics
From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus
From Computer Curriculum That Works For The Use Of Computer Intellignece Computer Science, Malachi B. Bacchus
Publications and Research
Computer interconnection can link different networks by using electrical artificial flow ways that can travel through different connections. these are called data network which travels through different sectors of the network simulation of service computer network using artificial intelligence to enhanced further understanding the computations, I've also demonstrated knowing by using the network to get better understanding of how ethical computing can be learned through universities and collegiate that can help established knowledge and healthy computer information. The main tools for the research are using data networking, ethical learning and translation towards different computer systems.
Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery
Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery
Publications and Research
Since we are living in a digital age, the need to protect ourselves and those who are vulnerable to cyber-attacks is paramount to prevent cyber attacks that steal information such as banking accounts and important sensitive information.
Our research team extensively investigated the five aspects of cybersecurity such as identity, protection, detection, and response. By conducting various interviews with cybersecurity professionals, we gathered information about these five aspects for example security intelligence or security operations and response, (thread hunting, response orchestration) identity access management, (identity management, and data protection), and risks (risk perspective). Our main goal is to look into …
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Publications and Research
•A wildfire is an unplanned, unwanted, uncontrolled fire in an area of combustible vegetation starting in rural areas and urban areas. •Recent studies have shown that the effect of anthropogenic climate change has fueled the wildfire events, leading to an increase in the annual burned areas and number of events. •California is one of the places having the most deadliest and destructive wildfire seasons. With the global warming effect of 1°C since 1850, the 20 largest wildfires events that have occurred in California, 8 of them were in 2017. (Center For Climate And Energy Solutions) •Climate change is primarily caused …
Responsive Web Design, Ashley Varon, David Karlins
Responsive Web Design, Ashley Varon, David Karlins
Publications and Research
Responsive web design is one of the most important topics in web. It can be one of the main reasons a website can be costing a business clients, and creating an effect on a business. The rise in popularity of mobile phones and tablets makes it crucial for a website to be designed to respond and adjust to different viewports. This project will research how important responsive web design is in 2020 and the positive or negative impacts it may have on the users, customers, and businesses. Companies must consider text size, layout, navigation, image sizes, and testing when designing …
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Publications and Research
The motivation of the project is to identify the legislators who voted frequently against their party in terms of their roll call votes using Office of Clerk U.S. House of Representatives Data Sets collected in 2018 and 2019. We construct a model to predict the parties of legislators based on their votes. The method we used is Decision Tree from Data Mining. Python was used to collect raw data from internet, SAS was used to clean data, and all other calculations and graphical presentations are performed using the R software.
Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "1: Introduction & State of Cybersecurity" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "2: Cybersecurity Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "7-8: Risk Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "5: Intro to Web Applications I" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "3-4: Networking Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "9-10: Data Protection & Cryptography" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "14: Business Continuity & Disaster Recovery" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Cis 4400 Data Warehousing: Lecture 1 - "Overview", Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture #1 for the course: CIS 4400: Data Warehousing for Analytics - "Overview" delivered at Baruch College in Spring 2020 by Royce Kok and B. Madhusudan as part of the NYC Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "13: Patching & Vulnerability Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Cis 4400 Data Warehousing - Lecture 2, Royce Kok, B Madhusudan, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture 2 for CIS 4400: Data Warehousing (Spring 2020)
Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "15: Application Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "11: Identity & Access Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "18-19: Anatomy of a Breach" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "12: Network & Endpoint Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Public Interest Technology: Coding For The Public Good, Devorah Kletenik
Public Interest Technology: Coding For The Public Good, Devorah Kletenik
Open Educational Resources
These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.
Accessibility: The Whys And The Hows, Devorah Kletenik
Accessibility: The Whys And The Hows, Devorah Kletenik
Open Educational Resources
This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
Publications and Research
One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.
Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng
Enhancing The Study Of Art History Utilizing Computational Thinking: Focus, Abstraction In Art (Modern), Douglas L. Moody, Sandra Cheng
Open Educational Resources
No abstract provided.
Quirky, Not Quacky: Quantum Computing For Librarians, Jill Cirasella
Quirky, Not Quacky: Quantum Computing For Librarians, Jill Cirasella
Publications and Research
This slideshow introduces librarians and non-scientists to the relatively young field of quantum computing.