Monthly Archives: September 2017

5 articles – Jason Zeng

1 – Maney, Kevin. “How Facebook’s AI Bots Learned Their Own Language and How to Lie; Bots that can negotiate your next deal on a hotel room might also know how to lie to you.” Newsweek, 18 Aug. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA500328738&it=r&asid=69aa88fb35fe12dab5bd14c91182634a. Accessed 7 Sept. 2017.

2 – One Small Step for AI, One Giant Step for Robotics.” Electronics For You, 16 Aug. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA500734726&it=r&asid=9aec3ed457ff35726551a15feb1f530c. Accessed 7 Sept. 2017.

3 – “Which Giant Tech Company Is Winning the Race to Be Skynet?” Vulture, 3 Aug. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA501526595&it=r&asid=bcff0424d96851f393550d38fac4f28d. Accessed 7 Sept. 2017.

4 – “Cue bits; Quantum computers.” The Economist, 11 Mar. 2017, p. 10(US). General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA485543885&it=r&asid=d715a0f27fa98a76e703b1893c0d3779. Accessed 7 Sept. 2017.

5 – Bauer, Meredith Rutland. “Quantum Computing Is Going Commercial With the Potential to Disrupt Everything; Problems that would take longer than a human’s life span on a classic computer will be completed in hours or days with quantum computing.” Newsweek, 21 Apr. 2017. General OneFile, go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CA489545172&it=r&asid=3d695aaf54176a58393bf1bb19bf87d1. Accessed 7 Sept. 2017.

 

Part One – Five Articles

  1. Technology turns cell phones into cash registers. (2015, June 29). Long Island Business News. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA420295204&asid=5d5406e01c2e3520da15b026cd3e51d5
  2. Naff, C. F. (2017, July-August). The future of sex: how technology, morality, and politics are reshaping human sexuality. The Humanist, 77(4), 12+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA499719552&asid=8ec4aa00915d5a6416e5945ea7f339b9
  3. Hill, T. (2017, February). Hook, line, and sinker: media disruptors that will influence the industry in 2017. Editor & Publisher, 150(2), 34+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA488193223&asid=7406b43c08870f91cae389ff922018f3
  4. Weiss-Meyer, A. (2017, May). Apps for refugees: How technology helps in a humanitarian crisis. The Atlantic, 319(4), 24+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA493990649&asid=43305f3a71efe1527052a8707c7d8ee7
  5. Rajecki, R. (2017, January 9). Software designed to simplify HVACR service: service management software smooths workflow, enhances professionalism. Air Conditioning, Heating & Refrigeration News, 260(2), 9+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA478640398&asid=d3e6d823e3626fa39bde383430cf36b2

750-word Expanded Definition

This next project is a 750-1000 word expanded definition. It should define a term that’s important to your studies and future career. It should be something you’re interested in and passionate about. To do this, you must use at least three library-sourced citations and use APA citation both in-text and in a separate References page. Here’s a template for the final document:  750-word-doc-template with example

For the first class (9/28), we’ll focus more on what you already know about the term you’ve selected, researching the term as defined by others and the use of the term in various publications. Here are the steps:

  1. Create a new document for your expanded definition.
  2. In your own words, define the term that you’re writing about.
  3. Read about your term on Wikipedia, paying attention to the kinds of information Wikipedia has about it, and focusing especially on the references section for possible sources in your further research. NOTE: Wikipedia can NOT be one of your three sources, but it’s a great place to get ideas for where to go next.
  4. Locate sources that define your selected term. Copy quotations and document all bibliographic information in the document you already opened. The more quotations and uses you can find, the more material you’ll have access to in writing the content of your expanded definition document.
  5. Think about what images you could incorporate into your document, especially when it comes to the audience-directed sentences. For example, if you’re writing about cloud computing and your first sentence is directed at middle school students, you could create an image of clouds connected to a computer; if your audience is other professionals, you could take a photo of a line of servers. Be creative and experiment. If you want to find something online, you’ll need to find things that are public domain or Creative Commons licensed (search here for things you can use, and be sure you attribute the images if the source asks you to).

Bring all your research to the next class.

For the next class (10/5), you’ll be writing a draft of your Expanded Definition and getting feedback from each other. That includes deciding what images to use and putting them into your document. Once you get their feedback (and mine), you’ll take it all home and bring in a final draft of the Expanded Definition on October 12.

Lecture slides

Part 1 – Five Articles

  1. Soryal, J., Liu, X. & Saadawi, T. (2013). DoS detection in IEEE 802.11 with the presence of hidden nodes.

               Journal of Advanced Research, 5(4), 415-422.

               doi:10.1016/j.jare.2013.11.001

 2. Lixia Xie, Xiao Zhang and Jiyong Zhang

Journal of computers. 8.9 (Sept. 2013): p2339

DOI: http//dx.doi.org/10.4304/jcp.8.9.2339-2347

3.  Malecki, F. (2011). A deeper, broader look at network security.

Network Security, 2011(12), 18-19.

4.  Network Security Tutorial

Tutorials Point – https://www.tutorialspoint.com/network_security/index.htm

5.  Network Security. (2012). Communications Today,Communications Today, April 21, 2012.

Email Assignment

To:                  Prof. Jacquelyn Blain, English Department, New York City College of Technology

From:             Fatema Jannat

Date:              September 5th, 2017

Subject:          Professional Interests and Goals

 

Dear prof Blain,

I’m in your English 2575 (E276) class that meets on Thursday from 6 pm to 8:30 pm. I have prepared this letter to tell you about my professional interests and goals after college. I am majoring in Computer System Technology here in City College of Technology. Most specifically, I am focusing on software development. After achieving my Bachelor’s degree on software development, I want to get my Master’s degree in Computer Information Systems for Managers from St. Johns University. In 2018, I plan to do an internship in the field of Computer Science. As I work on my master’s degree, I want to work with some dream computer science companies like Intel, Google, Microsoft, etc. Later, I also want to get a PHD degree in CIS.

Thank You,

Fatema Jannat

Summary – 1

Naik,P.G Kamath, R.S. Patil, M.B , Jun 2017 Client Virtualization using VMware for Manageable Learning Envirnoment at CSIBER, International Journal of Advanced Research in Computer Science Vol. 8 Issue 5, p 890-895, http://web.b.ebscohost.com/ehost/detail/detail?vid=7&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=124636467&db=aci

 

Abdelazia, Ahmed, 2016 Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues. Vol. 10 Issue 10, p4902-4932 http://web.b.ebscohost.com/ehost/detail/detail?vid=12&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=aci&AN=119398804

 

You Lu, Bao-Chuan Fu,2017 The Closer the Better: A Filtering Model for Malicious Traffic in SDN Network Domain.Journal of Residuals Science & Tehnology Vol 14 Issue 3 p471-481 http://web.b.ebscohost.com/ehost/detail/detail?vid=14&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=122877590&db=aci

 

Chen, Qingxia 2017, An Integrated Framework for Software Defined Networking, Caching, and Computing, IEEE Network, Vol 31 p46-55 http://web.b.ebscohost.com/ehost/detail/detail?vid=16&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=123392069&db=aci

 

Yang, Hwan-Seok 2015, A study on attack information collection using virtualization technology, Multimedia Tools & Applications, Vol 74 p8791-8799 http://web.b.ebscohost.com/ehost/detail/detail?vid=18&sid=4bbbb818-bfaa-4abe-88ab-70ea38c16798%40sessionmgr120&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=109466507&db=aci

Part one five articles

  1.   Field, A. (1996, June 15). Precision marketing. Inc., 18(9), 54+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA18397675&asid=f53c57e0c9234a1e75327174f4b5c171
  2.   Wheaton, J. (1998, May). Data detectives. Catalog Age, 15(6), 94+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA20898772&asid=d877648e77b75b2b66a8a3537a1edf50
  3. Hochhauser, R. (1992, September). The power of integrated database marketing. Direct Marketing, 55(5), 32+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA13617741&asid=5f756850427d83a06adaf57c648be111
  4. Hansotia, B. (1996, November). Achieving world-class database marketing with customer-focused strategies. Direct Marketing, 59(7), 58+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA19184835&asid=6b7e6e0fc62a06ce4fd344bc611ac3e9
  5. Gessaroli, J. (1995, May). Data mining: a powerful technology for database marketing. Telemarketing, 13(11), 64+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA17085514&asid=e142e6cdde2058ea4e539b7c7463880b

 

 

Bibliographic

1/ Gupta  Natasha , Irwin Julia D.(  Feb2016). In-class distractions: The role of Facebook and             the primary learning task. Computers in Human Behavior. Vol. 55, p1165-1178.

 

 

2/Lai, Chun, Li, Xiaoshi, Wang, Qiu (Aug2017). Students’ perceptions of teacher impact on their self-directed language learning with technology beyond the classroom: cases of Hong Kong and U.S.  Educational Technology Research & Development , Vol. 65 Issue 4, p1105-1133.
3/Nel, Liezel(Sep2017) Students as collaborators in creating meaningful learning experiences in technology-enhanced classrooms: An engaged scholarship approach. British Journal of Educational Technology. Vol. 48 Issue 5, p1131-1142.

 

4/ Chen, Huei-Yen Winnie, Donmez, Birsen (Jun2016)What drives technology-based distractions? A structural equation model on social-psychological factors of technology-based driver distraction engagement. Accident Analysis & Prevention. Vol. 91, p166-174.

 

5/ SPARKS, SARAH D. (6/3/2015) “Technology, Distraction, and Student Performance”. Education Week. , Vol. 34 Issue 32, p4-4.

APA citations

Petrus, Rafal 2017, Molecular routes to group IV magnesium and calcium nanocrystalline ceramics, Inorganic chemistry, http://pubs.acs.org/action/showCitFormats?href=http%3A%2F%2Fpubs.acs.org%2Fdoi%2Ffull%2F10.1021%2Facs.inorgchem.7b01772&doi=10.1021%2Facs.inorgchem.7b01772

 

Trost, B. M., & Ehmke, V. (2014, May 2). An Approach for Rapid Increase in Molecular Complexity: Atom Economic Routes to Fused Polycyclic Ring Systems. Retrieved September 7, 2017, from http://pubs.acs.org/doi/full/10.1021/ol5009872

 

Arellano, D. L. (2017, January 12). Room-Temperature Routes Toward the Creation of Zinc Oxide Films from Molecular Precursors. Retrieved September 7, 2017, from http://pubs.acs.org/doi/full/10.1021/acsomega.6b00324

 

Castañeda-Arriaga, R., & Galano, A. (2017, May 5). Exploring Chemical Routes Relevant to the Toxicity of Paracetamol and Its meta-Analogue at a Molecular Level. Retrieved September 7, 2017, from http://pubs.acs.org/doi/full/10.1021/acs.chemrestox.7b00024

 

Deshlahra, P., & Iglesia, E. (2014, November 5). Methanol Oxidative Dehydrogenation on Oxide Catalysts: Molecular and Dissociative Routes and Hydrogen Addition Energies as Descriptors of Reactivity. Retrieved September 7, 2017, from http://pubs.acs.org/doi/abs/10.1021/jp507922u

Five article

  1. Martin, Jane. OD Practitioner.Summer2017. Agile Organizational Change: Leveraging Learnings from Software Development,OD Practitioner 49 Issue 3, p39-41. 3p.

 

  1. Simão, Filho. Marum, Pinheiro. Plácido ,Rogério Adriano, Bessa Jul2017.Analysis of task allocation in distributed software development through a hybrid methodology of verbal decision analysis,Journal of software: Evolution & Process 29 Issue 7, pn/a-n/a. 18p. DOI: 10.1002/smr.1867.

 

  1. Yoh, Kevin. Infantolino, Benjamin W. May2017. Weekly Changes in Vastus Lateralis Volume Following ACL Injury,International Journal of Athletic Therapy & Training 22 Issue 3, p38-43. 6p. DOI: 10.1123/ijatt.2015-0077.

 

  1. Śliwowski, Robert. Grygorowicz, Monika. Hojszyk, Radosław. Jadczak, Łukasz.7/31/2017. The isokinetic strength profile of elite soccer players according to playing position.PLoS ONE 12 Issue 7, p1-13. 13p. DOI: 10.1371/journal.pone.0182177.

 

  1. Murfett, Malcolm. History Today. Dec2016. The Sinking of JAPAN.History Today 66 Issue 12, p20-27. 8p.