Group Page 1

G1-S

 In an increasingly technologically advancing world, where the internet is a significant part of our daily lives, cybersecurity is essential.  Digital technology could be easily susceptible to cybercrime.  If there is no protection in place, we expose ourselves to attacks, and threats on our digital data, our devices, and our systems. Cybercriminals are experts at extracting private and sensitive information from your stored data.  It affects businesses and individuals, the economy, threatens personal privacy, and national security. Cyber scams such as phishing, vishing, smishing, and spoofing are ways to steal your identity, banking, and your personal information. You need to protect yourself in more secure ways to avoid data breaches, and adapt to more preventive, and protective measures of cybersecurity.  You should understand areas of cyber risks, so that you do not become vulnerable to threats. 

G2– NS

With the overall goal of attracting future college students and to assist current COMD students with a path toward a specified job(s); the COMD dep. is to create a webpage outlining job titles with courses that would amplify foundational skills. Researchers obtained job market insight through COMD professors in a set of interviews performed by each researcher collected onto a questionnaire that was developed. Researchers compared student work with data collected to inspect how those skills were put to the test in past submitted student projects. Finally, the most relevant data gathered will be uploaded onto the COMD website as content. The next step will follow on to explore new methods of search optimizing the site.

G3– NS

ARCscholars is comprised of advanced City Tech architecture students and NYCHA young adults, united in their interest to study architecture and the urban fabric. Together they studied the condition at the Gowanus Houses in Brooklyn and collaboratively determined appropriate design improvements. The students were divided into three groups and engaged in the design of: the campus as a whole, the entrances to the residential buildings, and the redesign of the community center. All the work showcased the individual ideas of the students including public art, sustainability, and modern architecture.

G4– NS

ARCscholars is comprised of advanced City Tech architecture students and NYCHA young adults, united in their interest to study architecture and the urban fabric. Together they studied the condition at the Gowanus Houses in Brooklyn and collaboratively determined appropriate design improvements. The students were divided into three groups and engaged in the design of: the campus as a whole, the entrances to the residential buildings, and the redesign of the community center. All the work showcased the individual ideas of the students including public art, sustainability, and modern architecture.

G5– NS

ARCscholars is comprised of advanced City Tech architecture students and NYCHA young adults, united in their interest to study architecture and the urban fabric. Together they studied the condition at the Gowanus Houses in Brooklyn and collaboratively determined appropriate design improvements. The students were divided into three groups and engaged in the design of: the campus as a whole, the entrances to the residential buildings, and the redesign of the community center. All the work showcased the individual ideas of the students including public art, sustainability, and modern architecture.

G6-S

Minerals exist within food and are not detectable in their natural form. Instead, they are easily seen on x-ray imaging and MRI. Using low energy x-rays and photoelectric absorption the minerals; iron, manganese, and copper, were detected in mineral-rich fruits like apples. However, we found that the minerals discovered were inconclusive because of their similar K-edges. The use of filters like rhodium, silver, and iodine aids in removing K and Mn from apples. We compared imaging photos with MRI images, proving Fe, Mn present excluding Cu. The use of heat shock displays the change the mineral’s shape, porosity, and brightness.

G7-S

External filters such as Aluminum sheets, Silver, and Iodine were used to modify low energy X-rays for the detection of minerals found in apples. The absorption pattern for the modified x-ray beams was analyzed. Differentiation between the imaging of iron and other minerals was challenging, however, a common distribution pattern from the core to the cortex of the apples was observed for all varieties of apples tested.​ After making exposures with all three filters: silver, rhodium, and iodine, Silver proved to be the most effective in removing specific mineral content in the apples as it filtered out everything from 5 KeV and below. This allowed for the radiographing and detection of iron, potassium, and magnesium as significant attenuation occurred with these minerals.​ ​

G8-S

The biggest concern for the future of human civilization in this day of age is the environment. Urbanized regions especially neighborhoods with high percentages of colored people experience the most environmental injustice. By collecting demographic data from NYC OpenData, Landsat 8 to get satellite imagery for surface temperature, and U.S Census Bureau for income statistics then analyzing the data on QGIS and excel, findings show that there is a clear correlation between income and land surface temperature among different demographics. But these aren’t the only factors in environmental injustice. As this is an ongoing project, more data and research is yet to be collected and analyzed for future findings.

G9-S

G10-S

Hi my name is Hudda Siddique and my teammates name is Kaung Myat and our faculty mentor Professor Patrick Slattery from CST department and we did our research on Business Information Security Officer(BISO) Responsibilities and role development.You might be wondering what is a Business Information Security Officer ? Well I am here to tell you that a Business Information Security officer’s senior cybersecurity role in an enterprise is the Chief Information Security Officer (CISO) who is held accountable for information technology strategy and execution and some Business Information security officer responsibilities are Creating and sustaining a program for business information security, including standards, guidelines, and policy.