Before the end of class, copy-and-paste your research logbook into a comment made to this blog post. Books that you might find useful also have to be entered into your logbook along with any quotes that you type up from the book resource. Remember to reformat your bibliographic data as an APA Reference entry, and include a parenthetical citation for all material quoted from a text.
We will continue your research during Thursdayâs class as well. If you need to visit the library during class, you may do so only after talking with Professor Ellis at the beginning of class.
TO: Professor Ellis
FROM: Jose A. Jimenez
DATE: 04/06/2017
SUBJECT: Research Logbook Update
1)
Energy efficiency analysis of cache-enabled cooperative dense small cell networks.
By: Jinbo Liu; Shaohui Sun. IET Communications. 2017, Vol. 11 Issue 4, p477-482. 6p
âSmall cell technologies deployed densely will become increasingly
important in terms of providing more uniform and higher data rates
for mobile users in the future 5th generation (5G) networks due to
its smaller cell size and lower transmit power, which can reduce the
network congestionâ
(js et al., 2017, p. 477).
Keywords: 5th generation, higher data rates, lower transmit power.
Jinbo, L., & Shaohui, S. (2017). Energy efficiency analysis of cache-enabled cooperative dense small cell networks. IET Communications, 11(4), 477-482. doi:10.1049/iet-com.2016.0680
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=121634241&site=ehost-live&scope=site
2)
10 Reasons to Get Excited About the Advent of 5G Wireless.
By: Reisinger, Don. eWeek. 02/27/2017, p1-1. 1p.
âSpeed is arguably one of the more important 5G features. According to the Next Generation Mobile Networks Alliance, which defines the technology’s requirements, 5G should be capable at a minimum of delivering speeds of 100Mbps in metropolitan areas and “tens of megabits per second” in smaller areas. Carrier tests have already achieved 1Gbps and faster.â
(Reisinger, 2017, pa 1).
Keywords: Speed, 5G, Tens of megabits per second.
Reisinger, D. (2017). 10 Reasons to Get Excited About the Advent of 5G Wireless. Eweek, 1.
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=121495570&site=ehost-live&scope=site
3)
Virtual MAC concept and its protocol design in virtualised heterogeneous wireless network.
By: Bo Fan; Hui Tian; Yuexia Zhang; Yuan Zhang. IET Communications. 2017, Vol. 11 Issue 1, p53-60
Hence, mobile network operators (MNOs) have to increase network investments, including licensed spectrum, cell sites and backhaul infrastructure to improve network capacity and fulfil usersâ needs. Besides, with 5G era coming, the coexistence of multiple radio access technologies (RATs) requires an efficient methodology to coordinate these networks.
(bhyy et al., p. 54).
Keywords: licensed spectrum, radio access technologies (RATs), mobile network operators (MNOs)
Bo, F., Hui, T., Yuexia, Z., & Yuan, Z. (2017). Virtual MAC concept and its protocol design in virtualised heterogeneous wireless network. IET Communications, 11(1), 53-60. doi:10.1049/iet-com.2016.0293
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=120299779&site=ehost-live&scope=site
4)
Major Wireless Developments.
By: FRENZEL, LOU. Electronic Design. Jan 2017, Vol. 65 Issue 1, p12-16
âThe Fifth-Generation cellular system is a work in progress; the Third-Generation Partnership Project (3GPP) is grinding away at the standards details. A final standard is scheduled for the 2019-2020 timeframe, although one carrier (AT&T) is pushing for earlier standard definition in 2017. That may not happen, but it shows the need and interest for faster systems with increased user capacity.â
(Frenzel, 2017, p. 1)
Keywords: cellular system, project (3GPP), faster systems
FRENZEL, L. (2017). Major Wireless Developments. Electronic Design, 65(1), 12-16.
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=120674543&site=ehost-live&scope=site
5)
Enabling 5G mobile wireless technologies.
By: Le, Long; Lau, Vincent; Jorswieck, Eduard; Dao, Ngoc-Dung; Haghighat, Afshin; Kim, Dong; Le-Ngoc, Tho. EURASIP Journal on Wireless Communications & Networking. 9/27/2015, Vol. 2015 Issue 1, p1-14. 14p
âIt is predicted that the 5G wireless system should be able to deliver as much as 1000 times of the capacity pro-vided by todayâs mobile networks.â
(lvenadt et al., p. 1)
Le, L., Lau, V., Jorswieck, E., Dao, N., Haghighat, A., Kim, D., & Le-Ngoc, T. (2015, September 27). Enabling 5G mobile wireless technologies. EURASIP Journal on Wireless Communications & Networking. pp. 1-14.
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=109966157&site=ehost-live&scope=site
6)
QUALCOMM TEASES A Prototype Spectrum-Sharing Radio.
Microwaves & RF. Dec2016, Vol. 55 Issue 12, p21-21. 1p. 1
âThe 5G New Radio, as the prototype is called, searches up and down the wireless spectrum for potential openings. The radio can broadcast on frequency bands below 6 GHz, where most of today’s devices send communications, and then leap into higher bands in the millimeter-wave range.â
(Anonymous, 2016, p. 1)
QUALCOMM TEASES A Prototype Spectrum-Sharing Radio. (2016). Microwaves & RF, 55(12), 21.
http://web.a.ebscohost.com/ehost/detail/detail?sid=45fe7445-cbe8-46ec-97c0-b47457a5a85e%40sessionmgr4008&vid=1&hid=4201&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=120126523&db=a9h
7)
Real 5G Years Away Even as Wireless Industry Prepares for Its Arrival.
By: Burt, Jeffrey. eWeek. 10/3/2016, p1-1. 1p.
âIt’s called 5G, essentially the next generation of wireless connectivity after 4G LTE, and it holds the promise of more speed and capacity and lower latency to unlock the potential of everything from gaming, streaming video and virtual reality (VR) to the internet of things (IoT), smart cities, machine-to-machine (M2M) communications and autonomous cars.â
(Burt, 2016, p. 1)
Burt, J. (2016). Real 5G Years Away Even as Wireless Industry Prepares for Its Arrival. Eweek, 1.
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=118557039&site=ehost-live&scope=site
8)
Performance of emerging multi-carrier waveforms for 5G asynchronous communications.
By: Van Eeckhaute, Mathieu; Bourdoux, André; De Doncker, Philippe; Horlin, François. EURASIP Journal on Wireless Communications & Networking. 2/7/2017, Vol. 2017 Issue 1, p1-15
âIn the near future, it is expected that the mobile internet will massively be used for machine-
to-machine communications, introducing the concept of Internet-of-Things (IoT).â
(vmaph et al., 2017 p. 1)
Van Eeckhaute, M., Bourdoux, A., De Doncker, P., & Horlin, F. (2017). Performance of emerging multi-carrier waveforms for 5G asynchronous communications. EURASIP Journal On Wireless Communications & Networking, 2017(1), 1-15.
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=121163106&site=ehost-live&scope=site
Below are 7 out 8 Library sources for my research-based project 2 of Healthcare Regulation U.S
Walshe, K., & Shortell, S. M. Social regulation of healthcare organizations in the United States: developing a framework for evaluation. Health Services Management Research. May 2004, 17 (2), p79-99.
âSocial regulation is ubiquitous in the US healthcare system, and American healthcare organizations claim to be among the most regulated institutions in the world. Yet relatively little is known about the impact of social regulation on these organizations’ performance, or about the characteristics or determinants of effective regulatory strategies and approachesâ(Walshe, K., & Shortell, S. M. 2004, p.79).
Moffat, Jeffrey C. (2016). EMTALA and managed care. In Department of Health and Human Services (Eds.), EMTALA Answer Book (p.1-26). New York: Aspen Publishers Inc.
âHospitals is obligated to comply with the requirements if an individual seeking care is a member of a managed health care plan, and mentions that the U.S. Department of Health and Human Services issues the rules regarding the servicesâ (Moffat, J. C. 2016 p.10).
Moran, Patricia A. 2015. Health Care Compliance: A Checklist for Employers. Managing Benefits Plans,17 (3), p11-16.
âThe Affordable Care Actâs ââemployer shared responsibilityââ mandate, employers
of a certain size must either offer coverage to full-time employees, or risk paying a penaltyâ (Moran, Patricia A. 2015, p.11).
Modern Healthcare. 2016, January 4. 2016 will bring flurry of new rules and regulations affecting health care. Modern Healthcare, 46, p12-12.
âHealth plans will face penalties for publishing inaccurate provider directories: Medicare Advantage plans will have to pay $25,000 per day per member, while federal exchange plans must pay $100 per day per memberâ (Modern Healthcare, 2016 p.12).
Peregrine, M.W., & Schwartz, J.R. March 2002 Must-know legal issues for healthcare CFOS. Healthcare Financial Management, 56 (3), p50-57.
âRegulatory agencies, such as the Securities and Exchange Commission, are scrutinizing not-for profit and charitable attention to existing regulations, healthcare financial managers need to increase their diligence in ensuring their organization’sâ compliance with those laws governing areas for which they traditionally have been accountable, including auditor relationships, restricted gifts, consulting arrangement, investment management, and financial reportingâ(Peregrine, M.W., & Schwartz, J.R. 2002 p.51).
Rubenfire, A. 2017. Trump wants to thin federal regulations, and the healthcare industry would love to help. Healthcare,47 (6) p. 20
âHealthcare is one of the most regulated industries in the U.S. economy, so President Donald Trump made a lot of healthcare leaders happy with his executive order calling for the federal government to kill two regulations with each new one it rolls out. Fulfilling that promise will be complicated, if not totally unworkableâthe order raises important questions that might not be answered until itâs enforced in practice. It will be up to the Office of Management and Budget to standardize how regulatory costs are measured and clarify what qualifies as new and offsetting regulationsâthe agency already issued interim guidance for regulators on Friday that answers certain questionsâ (Rubenfire, A. 2017 p.20).
Avraham, R. 2011. Private Regulations. Harvard Journal of Law & Public Policy, 34 (2), p.543-638
âImproving the quality of information channeled to doctors can further what legislators agree are healthcare reform’s three main goals: increasing access for the uninsured, controlling rising costs, and improving patient safety by improving the quality of careâ (Avraham, R. 2011 p.546).
Unger, R., Chandler, C. (2009). A project guide to UX design: For user experience designers in the field or in the making. Berkeley, CA : New Riders.
Keinonen, T. (2010). Protect and appreciate- notes on the justification of user-centered design. International Journal Of Design, 4(1), 17-27.
âThe design communityâs lack of attention and commitment to genuine human and ecological needs has been repeatedly recognised and criticizedâ (Keinonen, 2010 p.17).
Marti, P., Bannon, L. J. (2009). Exploring user-centred design in practice: some caveats. Knowledge, Technology & Policy, 22(1), 7-15.
âWhile a user-centred perspective is required at all times in the design team, the forms of participation of users in the design process needs to fit the context and can vary significantly from that presented as the prototypical UCD approachâ (Marti & Bannon, 2009 p. 7).
Dirin, A., Nieminen, M. (2015). mLUX: usability and user experience development framework for m-learning. International Journal Of Interactive Mobile Technologies, 9(3), 37-51.
âUser requirements are the focus of all stages of development cycleâ (Dirin & Nieminen, 2015 p. 38).
Marcos, M. m. (2010). Interview with lou rosenfeld. El Profesional De La InformaciĂłn, 19(4), 435-437.
âIdentify your usersâ most common information needs, and see how well your site succeeds in enabling users to satisfy those needsâ (Marcos, 2010, p. 436).
Fichter, D., Wisniewski, J. (2016). Emotional design, storytelling, ‘slippiness,’ and understandable icons. Online Searcher, 40(1), 74-76.
âPeople will remember how they feel long after they remem ber the particular deÂ
tails of what they were doingâ (Fichter & Wisniewski, 2016, p. 74).
Adisen-North, A. (2007). Designing for usability. New Media Age, 10-11.
âHowever, good usability isn’t just about user testing products just before they go live. Ifs a more established process of keeping users at the centre of product development, from the project initiation stage through to delivery and beyondâ (Adisen-North, 2007, p. 10).
Putnam, C., Rose, E., Johnson, E. J., & Kolko, B. (2009). Adapting user-centered design methods to design for diverse populations. Information Technologies & International Development, 5(4), 51-73.
âUCD is a design philosophy that emphasizes the importance of considering the end userâs needs, goals, and desires when creating products or servicesâ (Putnam, Rose, Johnson, & Kolko, 2009, p. 51).
Andrews, C., Burleson, D., Dunks, K., Elmore, K., Lambert, C.S., Oppegaard, B., ⊠Zobel, G. (2012). A new method in user-centered design: collaborative prototype design process (CPDP). Journal of Technical Writing & Communication, Vol. 42 (Issue 2), p123-142. 20p.
âThe CPDP is an innovative approach to user-centered website design that emphasizes collaboration, iterative testing, and data-driven designâ (Andrews et al, 2012, p. 123).
TO: Professor ellis
FROM: Anelsy Rodriguez
DATE: 04/06/2017
SUBJECT:Research Logbook-Update
Here you can find some of my Logbook Updated (library sources) that I will use for project 2.
Masson, V., et Al. (2014, June 4)âSolar Panels Reduce Both Global Warming and Urban Heat Island.â Frontiers. from http://journal.frontiersin.org/article/10.3389/fenvs.2014.00014/full
âSims et al. (2003) show that most renewable energies can, in certain circumstances, reduce cost as well as CO2 emissions, except for solar power, which remains expensiveâ (Bonhomme, June 4, 2014, Pa.2 ).
Anonymous. (2011, Sept. ) “Solar panels.” The Science Teacher, p. 24. Academic OneFile From http://go.galegroup.com/ps/i.do?&id=GALE|A267811167&v=2.1&u=cuny_nytc&it=r&p=AONE&sw=w
âIn a study in the journal Solar Energy, Kleissl and his team published what they believe are the first peer-reviewed measurements of the cooling benefits provided by solar photovoltaic panels. Using thermal imaging, researchers determined that during â (Anonymous, Sept. 2011, p. 24.).
Vertat, Ivo, and Ales Vobornik. (2014 ). “Efficient and reliable solar panels for small CubeSat picosatellites.” International Journal of Photoenergy. From http://go.galegroup.com/ps/i.do?&id=GALE|A424006833&v=2.1&u=cuny_nytc&it=r&p=AONE&sw=w
âSolar panels are faced to rain, snow, freeze, hailstone, overheating, sandstorm, and many other effects. In [5, 6] the wind-induced pressures on inland solar panels are evaluated. In space usage the solar panels are not faced with the unstable meteorological conditions, but solar panel area and solar cell efficiency are critical due to satellite (or picosatellite) mass limitâ (Vertat, et Al., 2014, pa 4).
Debije, Michael. (2015) “Better luminescent solar panels in prospect.” Nature, vol. 519, no. 7543, p. 298+. Nursing and Allied Health Collection From: http://go.galegroup.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm¤tPosition=1&docId=GALE%7CA406164818&docType=Article&sort=RELEVANCE&contentSegment=&prodId=PPNU&contentSet=GALE%7CA406164818&searchId=R2&userGroupName=cuny_nytc&inPS=true
âDevices known as luminescent solar concentrators could find use as renewable-energy generators, but have so far been plagued by a major light-reabsorption effect. A new study offers a promising route to tackling this problemâ (Debije, 2015, p. 298).
Goddard, Leah. (2015)”The solar panel manufacturing industry’s boom, bust, and future.” Business Economics, vol. 50, no. 3, p. 147. From: http://go.galegroup.com/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=BasicSearchForm¤tPosition=20&docId=GALE%7CA433119639&docType=Article&sort=Relevance&contentSegment=&prodId=AONE&contentSet=GALE%7CA433119639&searchId=R3&userGroupName=cuny_nytc&inPS=true
âNevertheless, despite strong growth in solar panel installation worldwide and the initial dramatic growth in domestic solar panel manufacturing, U.S. solar panel producers have struggled to stay competitive in the global marketplace in recent yearsâ (Goddard, 2015, p. 147).
Paterniani, J. (2012). âGreenhouse tomato production with electricity generation by roof-mounted flexible solar panels.â Seielo. vol.69 no.4 From:http://www.scielo.br/scielo.php?script=sci_arttext&pid=S0103-90162012000400001&lng=en&nrm=iso&tlng=en
âThe integration of renewable energy sources into greenhouse crop production in southeastern Spain could provide extra income for growersâ (Paterniani, 2012).
Last, J. Ed. (2007). Green Energy. A Dictionary of Public Health. Retrived from: http://www.oxfordreference.com/view/10.1093/acref/9780195160901.001.0001/acref-9780195160901
âEnergy that is generated without polluting the environment by adding to the burden of atmospheric greenhouse gases or causing other environmental harm, such as loss of human and wildlife habitat by construction of large hydroelectric dams. Available varieties of green energy include solar and wind power, tidal power, and geothermal energy sourcesâ (Last, 2007).
Last, J. Ed. (2007). Energy. A Dictionary of Public Health. Retrived from: http://www.oxfordreference.com/view/10.1093/acref/9780195160901.001.0001/acref-9780195160901-e-1312?rskey=suqIoy&result=1
âThe force generated by combustion, e.g., of calories during metabolism, or carbon-based fuels in a furnace or power plant, and by radioactive nuclear transformation. Several sources and types of energy include kinetic, thermal, nuclear, etc â (Last, 2007).
Last, J. Ed. (2007). Renewable Sources. A Dictionary of Public Health. Retrieved from: http://www.oxfordreference.com/view/10.1093/acref/9780195160901.001.0001/acref-9780195160901-e-3876?rskey=FFtHdv&result=1
âResources derived from natural systems that are not finite, such as solar, tidal, and wind energy, or from living organisms, such as trees that can be replaced by others as they are used. The term is used mainly in referring to energy resources; renewable energy resources are those derived from sun, wind, tides, or vegetable or animal sources. These include biomass fuels, ethanol (alcohol derived from fermentation, e.g., of corn), methane generated by fermentation of manure or human waste, and, technically, power generation using solar, wind, and tidal energy. See also green energyâ (Last, 2007).
Last, J. Ed. (2007). hydroelectric power generation. A Dictionary of Public Health. Retrieved from:http://www.oxfordreference.com/view/10.1093/acref/9780195160901.001.0001/acref-9780195160901-e-2116?rskey=0tAcxt&result=2
âA form of renewable energy production, considered âcleanâ because it does not produce harmful emissions, as do carbon-based fuels. Hydroelectric dams may drown fertile river valleys that were previously the habitat for large populations that have been displaced to environments less capable of sustaining them, although they also provide water storage for irrigation of previously parched land. In tropical and subtropical regions, dams and irrigation schemes may extend the range and habitat for disease vectors, including mosquitoes and snails. The positive and negative side effects of hydroelectric dams are more often considered in long-range planning now than they were in the early 20th centuryâ (Last, 2007).
Evans, Kim Masters. (2015). “Renewable Energy.” Energy: Supplies, Sustainability, and Costs, ed., Gale, pp. 89-103. from: http://go.galegroup.com/ps/retrieve.do?tabID=T003&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=BasicSearchForm¤tPosition=2&docId=GALE%7CCX3624600012&docType=Topic+overview&sort=RELEVANCE&contentSegment=&prodId=GVRL&contentSet=GALE%7CCX3624600012&searchId=R1&userGroupName=cuny_nytc&inPS=true
âSeveral international organizations are devoted to promoting the use of renewable energy sourcesâ (Evans, 2015, pp. 89-103).
Evans, Kim Masters. (2013) “Renewable Energy.” Energy: Supplies, Sustainability, and Costs, 2013 ed., Gale, pp. 85-99. from:
âLike fossil fuels, renewable energy sources are produced naturally, but unlike fossil fuels, renewable energy sources do not take millennia to form. Some are available immediately and regenerate constantly. Examples include wind, sunlight, tides, and the heat stored beneath the earth’s crustâ (Evans, 2013, pp. 85-99).
Keywords: Energy, renewable sources, power, photovoltaic panels, solar cell, generator, installation, green energy.
TO: Professor Ellis
FROM: Kazi Maoya
DATE: 4/6/2017
SUBJECT: Research logbook update
The future of cloud computing.
Full Text Available
Periodical
By: Ferguson, Scott. eWeek. 10/20/2008, Vol. 25 Issue 30, p17-17. 1p.
âWhen it comes to building out cloud computing infrastructures in the next two years, two of the world’s most formidable IT companies Google and Microsoftâare preparing to pour money and resources into developing significantly different models of how this type of
computing should look.â
(Ferguson,Scott, October 20,2008 p.17)
Keyword:formidable,infrastructures.
Cloud computing in e-Science: research challenges and opportunities.
Full Text Available
Academic Journal
By: Yang, Xiaoyu; Wallom, David; Waddington, Simon; Wang, Jianwu; Shaon, Arif; Matthews, Brian; Wilson, Michael; Guo, Yike; Guo, Li; Blower, Jon; Vasilakos, Athanasios; Liu, Kecheng; Kershaw, Philip. Journal of Supercomputing. Oct2014, Vol. 70 Issue 1, p408-464. 57p. DOI: 10.1007/s11227-014-1251-5.
âNext-generation scientific research has radically changed the way in which science is
carried out [1,2]. With the assistance of modern e-Infrastructure that integrates high performance computing, large-capacity data storage facilities and high-speed network
infrastructure, the exploration of previously unknown problems can now be solved by
simulation, generation and analysis of large amounts of data, sharing of geographically
distributed resources (e.g. computing facilities, data, scripts, experimental plans,
workflows) and global research collaboration.â
(Yang,Xiaoyu, Journal of Supercomputing, October 2014 p409)
Key word: radically,integrates,simulation,collaboration.
REQUIREMENTS ENGINEERING FOR CLOUD COMPUTING ADAPTIVE MODEL.
Full Text Available
Academic Journal
By: Surendro, Kridanto; Supriana, Aradea; Supriana, Iping. Journal of Information & Communication Technology, Dec2016, Vol. 15 Issue 2, p1-17, 17p
âEach organization will require different computational resources. This is influenced by the business view of the organization which has particular characteristics different from the characteristics of other organizations,even when they belong to the same type of organization. Thus, the role of understanding the organizationâs environment should be well defined; a
holistic understanding which covers the real/actual needs of organizations.If this aspect is not considered, computational resources will not support the organizations; rather, they have a short lifetime and become a burden for the organizations.â
(Surendro,Kridanto,Journal of Information & Communication, December 2016, p2)
Keyword:Computational,particular,holistic.
Impact of Security Issues in Cloud Computing Towards Businesses.
Full Text Available
Academic Journal
By: Methqal AlFawwaz, Bader. World of Computer Science & Information Technology Journal, 2017, Vol. 7 Issue 1, p1-6, 6p
âThe different types of attacks in cloud computing have varying levels of impact on the operations of a business and the potential to interrupt the same. Hence, different levels of attention and consideration is afforded the attacks existing in an identified context. Essentially, the main concern with respect to the use of cloud computing in business is the loss of compromise of data. Whereas each of the different attacks leads to the loss or compromise of client information, the prevention of each remains a contextualized approach. Denial of service attacks is arguably among the leading security threats in corporate engagements. Such attacks cast a strain on the dedicated cloud computing resources of an organization and thus leading to additional costs. Ideally, cloud computing operates through dedication of storage space and computing bandwidth to connected users. Where such resources are under attack in the course of denial of service, the effectiveness of the network to the particular users remains hampered. [11] notes that Denial of Service Attacks lead to additional costs in the maintenance of the cloud-computing network associated with a particular organization. The figure below gives an illustration of the execution procedure of a Denial of Service Attack.â
(Methqal AlFawaz,World of Computer Science & Information Technology, 2017,p3)
Keywords-Consideration,afforded,prevention,contextualized,arguably,illustration.
On the Clouds: A New Way of Computing.
Full Text Available
Academic Journal
By: Yan Han. Information Technology & Libraries, Jun2010, Vol. 29 Issue 2, p87-92, 6p, 1 Black and White Photograph, 1 Diagram
âScholarly communication and new ways of teaching provide an opportunity for academic
institutions to collaborate on providing access to scholarly materials and research data. There is a growing need to handle large amounts of data using computer algorithms that presents challenges to libraries with limited experience in handling non textual materials. Because of
the current economic crisis, academic institutions need to find ways to acquire and manage computing resources in a cost-effective manner.â
(Yan Han, Information Technology & Libraries,Jun 2010,p87)
Key word:Scholarly,collaborate,textual,cost-effective.
An Analysis of the Benefits of Cloud Services for Supply Chain Using Analytic Hierarchy Process.
Full Text Available
Academic Journal
By: Gowda, Anil B.; Subramanya, K. N.. IUP Journal of Computer Sciences, Oct2015, Vol. 9 Issue 4, p31-45, 15p
âThere are many factors that influence the decision making in a supply chain, leading
to the successful operation of various activities in a supply chain. Hence, it is important
that the information is available instantaneously for making a quick decision. Quick
decisions help in fulfilling customer demands quickly. With the existing vendors
catering to the regular supplies, new partners offering value-added services need to be
integrated. This also causes a change in the business relationship from long-term
contracts to short-term contracts. This leads to an event-driven management for dynamically creating and delivering individualized products and services. Developments
in the business world and information technology have enabled decision makers to
have a sharper focus on various issues. Globalization of the supply chain activities in
many companies has led to adoption of information technology. Over the years, various
information technologies have been developed, and today, the world looks at cloud
computing techniques as one of the major development in IT that can facilitate quick
decision making. Today, various Information Technology solutions are available for
managing the supply chain services, and hence there is a need to evaluate the services
in terms of their importance. Cloud service offers various customization facilities at
lower price and hence is a potential technique to manage the Supply Chain Network
(SCN). A cloud service integrated into the supply chain network offering various supply
chain solutions is referred to as Cloud Supply Chain as a Service (CSCaaS) and the entire
network of supply chain is referred to as Cloud Supply Chain Network (CSCN).â
(Gowda, Anil B, Journal of Computer Science, October 2015,p32)
Key word:Instantaneously,integrated,evaluate.
A Survey on Data Security and Integrity in Cloud Computing.
Full Text Available
Academic Journal
By: Ambika, N.; Sujaritha, M.. International Journal of Advanced Research in Computer Science, Jul/Aug2016, Vol. 7 Issue 4, p57-63, 7p
âThe problem of access control on outsourced data to `honest but curious’ cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data les, were re-encryption and retransmission by the data owner may not be acceptable.Considering the user privacy and data security in cloud environment, in this chapter, a solution is proposed to achieve flexible and fine-grained access control on outsourced data les. In particular, the problem of defining and assigning keys to users is concerned. The access policies and users’ information are hidden to the third-party cloud servers. The proposed scheme is partially based on the observation that, in practical application scenarios each user
can be associated with a set of attributes which are meaningful in the access policy and data le context. The access policy can thus be defined as a logical expression formula over different attribute sets to reflect the scope of data les that the kind of users is allowed to access. As any
access policy can be represented using a logical expression formula, fine-grained access control can be accomplished.â
(Ambika,International Journal of Advanced Research in Computer Science, Jul/Aug 2016, p62)
Keyword:re-encryption,retransmission,scheme,scenarios.
Benefits and Challenges of Mobile Cloud Computing.
Full Text Available
Academic Journal
By: Guha, Radha. International Journal of Simulation — Systems, Science & Technology, 2013, Vol. 14 Issue 4, p15-20, 6p
âThe number of mobile devices, end-users and mobile applications has catapulted in the current decade. Many more people have smartphones with wireless connections to the internet even if they do not have a personal computer. The smartphone market is driven by the mobile applications like iPhone apps, Google apps etc. Driven by the mobile apps, smartphones are becoming popular and according to ABI Research [10] by the end of 2013 there will be 1.4 billion smartphone users in the world and increasingly more number of people will switch to smartphones in near future. These smartphones include advanced application programming interface (API) to include third party applications. Recent data shows [11] voice traffic is only 2% of the total wireless traffic in North America and the rest 98% is for mobile application data. Thus smart-phones and tablets are increasing data activity many fold in the wireless bandwidth than the older generation of mobile phones.â
(Guha,Radha.International Journal of Simulation-Systems, Science & Technology,2013, p16)
Key word:catapulted, interface.
TO: Professor Ellis
FROM: Adrian Valarezo
DATE: 4/6/17
SUBJECT: Project 2 Articles
1.Private Property and Property Rights. (2008). In Everyday Finance: Economics, Personal Money Management, and Entrepreneurship (Vol. 1, pp. 241-244). Detroit: Gale. Retrieved from http://go.galegroup.com/ps/i.do?p=GVRL&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CCX2830600100&asid=95025b9a0e5de541fe5072dc2c9d064c
âOne of the earliest thinkers to deal with the notion that we now call private property was the ancient Greek philosopher Aristotle. In his work Politics, Aristotle pointed out the tendency of people not to respect or maintain property that was public. Likewise, he noted, when people are required to share equally both the burdens and rewards of property ownership, there is a high likelihood that they will become displeased over disparities in workloads and rewards. While humans came into conflict over many issues, Aristotle observed, they were especially likely to do so over issues arising from common ownership of property.â (2008, p.241)
2.Copyright (c) 1998 The John Marshall Law School The John Marshall Law Review, Winter, 1998, 31 J. Marshall L. Rev. 299, 1575 words, SYMPOSIUM: THE ROBERT KRATOVIL MEMORIAL SEMINAR IN REAL ESTATE LAW: REINVENTING AMERICA’S MASTER PLANNED COMMUNITIES: FOREWORD, Celeste M. Hammond*
âBy the end of the 1980s there were more than 130,000 residential community associations operating in the United States and more than 30 million Americans subject to their governance. Predictions are that at least fifty million Americans will be living in some form of common interest community by the turn of the century, since nearly one out of every three housing units being built has some form of governing association.â (1998, Rev. 299)
3. By, J. F. (1997, Sep 09). Trimming role of lawyers in fairfield real estate. New York Times (1923-Current File) Retrieved from https://search.proquest.com/docview/109700563?accountid=28313
âItâs like having a babyâ said Joy Kony Peshkin, a Wesport lawyer. âDo you need a doctor? No. Anyone can stand there and catch. But youâre damn glad to have one if something goes wrong. (Fritsch, 1997)
4. Notaro, A. (2001). Journal of American Studies, 35(3), 517-518. Retrieved from http://www.jstor.org/stable/27557026
âUrban Castles, by independent scholar Jared Day, is a history of New York City’s tenements, and it reminds us of the importance of the historical study of law. In rich detail, it explores how tenants and landlords struggled with one another over city housing, and thus we learn whence came now taken-for-granted legal forms such as the security deposit, the standardized lease, and rent control laws. Too often, property rights are analyzed in law schools in terms of economic theories offering little appreciation for the historical, human, and social forces that have shaped legal phenomena. Thus, first-year property professors lecture law students about how the words “rent control” figure in a theoretical melody buzzing with phrases like Pareto optimality, zero transaction costs, and efficient breaches. In contrast with this cool and sleek tune, Urban Castles registers real estate law in the cacophony of rent strikes, socialists and communists, taxpayers’ association’s, judicial activism, and government intervention.â (Notaro. 2001, p. 517)
5.Wilson, D. (2002). REAL ESTATE LAW. GPSolo, 19(7), 45-46. Retrieved from http://www.jstor.org/stable/23672399.
âThe first thing you should do to ensure you provide proper representation can be summed up in two words: web research. There is a checklist for due diligence, checklist for real estate closing or a step to step guide for evictionsâŠâ ( Wilson, 2002, p. 45).
6. Walston, J., & Lund, J. (2001). Using Legal Assistants in a REAL ESTATE PRACTICE. GPSolo, 18(3), 55-59. Retrieved from http://www.jstor.org/stable/23671944.
âThe ABA Standing Committee on Legal Assistants in 1991 developed the Model Guidelines for Utilization of Legal Assistants in order to assist lawyers with ethical considerations of
using assistants. The Model Guidelines provides ten considerations, summarized below:
1. A lawyer is responsible for all professional actions of assistants. A lawyer must take measures to ensure that the conduct of assistants is consistent with professional rules…â (Walston, 2001, p. 56).
7. Balbach, S. (1966). Title Insurance and the Lawyer. American Bar Association Journal, 52(1), 65-68. Retrieved from http://www.jstor.org/stable/25723478.
âthese are the very areas in which action should be taken now to prevent this from happening. The most effective means for so doing seems to be the use of a method where by an attorney offers the protection of his opinion and also insurance against all title defectsâ (Balbach, 1966, p. 67).
8. Boyd, B. (2014, January-February). Smart checklists and the future of real estate law practice. Probate & Property, 28(1), 34+. Retrieved from http://go.galegroup.com/ps/i.do?p=AONE&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA356583621&asid=e3081b40117f7d6395cbf48423aaaf8a.
âThere is also a very practical reason for such explanations to the client: no lawyer wants to work hard taking action that a client has no use for, and no client wants to get a bill for such work. To comply with such ethical duties, and to avoid such misunderstandings, ideally the lawyer should send to the client, as soon as feasible, a checklist confirming the documents and scope of work for such matter.â (Boyd, 2014, p. 34).
Below eight quotes from periodicals or academic journals on my chosen topic – Criminal Justice. Key words are to be found at the end.
WHREN AT TWENTY: SYSTEMIC RACIAL BIAS AND THE CRIMINAL JUSTICE SYSTEM.
Academic Journal
By: Katz, Lewis R. Case Western Reserve Law Review. Summer 2016, Vol. 66 Issue 4, p. 923-929
âIt is appropriate that this symposium acknowledges that the Supreme Court Term that began earlier this month marks the twentieth anniversary of the Courtâs decision in Whren v. United States.2 My choice of the word âacknowledgeâ is a neutral term. It is not intended to signify concurrence or celebration. Whren puts the Supreme Court squarely in the middle of the ongoing conflict: Whren fostered the condition that resulted in the current conflicts: racial policing. Nor has it been unusual in our history for the Supreme Court to stand at the forefront of racial injusticeâ (Katz, 2016, p 924).
STATE COURTS AND THE PROMISE OF PRETRIAL JUSTICE IN CRIMINAL CASES.
Academic Journal
By: WASHINGTON, ERIC T. New York University Law Review. Nov 2016, Vol. 91 Issue 5, p. 1087-1103
âState court chief justices and state court administrators have begun playing pivotal roles in developing policies regarding how best to handle individuals accused of a crime between arrest and the disposition of their cases. This willingness to tackle issues of bail reform is being driven by a new understanding on the part of judges about the actual risks involved in releasing people back into the community pending trialâ (Washington, 2016, p 1093).
Life after stop-and-frisk… really.
By: CLAXTON, MARQ. New York Amsterdam News. 5/9/2013, Vol. 104 Issue 19, p 13-35
âPrior to Terry v. Ohio, law enforcement was widely trusted to use common sense, professional discretion and generous legal cause to detain, question and, if necessary, search individuals. Because of questions regarding Fourth Amendment Violations, the courts codified the standards that police must use when stopping and/or searching people. Without a brand-new Supreme Court interpretation, the very sensible and reasonable standard established by the Terry v. Ohio case for stops and searches on the street will remain. The Supreme Court and the U.S. Constitution allow police officers to stop people based on the legal standard of âreasonable suspicionâ and utilize a âfriskâ search for weapons onlyâ (Claxton, 2013, p 35).
RACIAL PROFILING IN THE WAR ON DRUGS MEETS THE IMMIGRATION REMOVAL PROCESS: THE CASE OF MONCRIEFFE V. HOLDER.
Academic Journal
By: JOHNSON, KEVIN R. Denver University Law Review. 2015, Vol. 92 Issue 4, p 701-707
âThe Supreme Courtâs decision in Moncrieffe started me thinking in earnest about the relationship between the criminal justice system and immigration removal. In that case, Adrian Moncrieffe, a lawful permaÂnent resident, was facing removal from the United States based on a
criminal conviction for possession of the equivalent of two to three marijuana cigarettes. Addressing a straightforward question of immigration law, the Court found that the U.S. government could not remove Moncrieffe from the country.’ The Court specifically held that, because the crime in question did not constitute an âaggravated felony ,â mandatory removal was not justifiedâ (Johnson, 2015, p 701).
Court systems rethink the use of financial bail, which some say penalizes the poor.
Periodical
By: Laird, Lorelei. ABA Journal. Apr 2016, p 1-1.
âStories like Wise’s illustrate why court systems are rethinking the use of financial bail. Concerned about the chain of negative effects bail can have on people of modest means, as well as its contribution to jail overcrowding and costs, jurisdictions around the nation are reforming bail. In 2013, Kentucky was among the earliest to adopt a pretrial system replacing cash bond with risk assessments and pretrial supervision. In 2014, New Jersey voters agreed to a similar system.
Last summer, New York City announced it was replacing money bond for low-risk defendants with text reminders to appear in court and counseling as appropriate. The state’s chief judge, Jonathan Lippman, announced in October that New York would encourage judges to use alternatives to financial bond. In Texas, Chief Justice Nathan Hecht formed a committee in June to study whether financial bond can be replaced with an evidence-based screening process.
Even the U.S. Department of Justice has come out strongly against the use of financial bail. Last year, the department intervened in a little-noticed lawsuit challenging bail practices in Clanton, Alabama. “It is the position of the United States that [financial bond, set] without any regard for indigence, not only violates the 14th Amendment’s equal protection clause but also constitutes bad public policy,” the department wrote, intervening in a lawsuit filed by the nonprofit Equal Justice Under Lawâ (Laird, 2016, p 1).
SEPARATE, UNEQUAL, AND DEADLY. (cover story).
Periodical
By: FREED WESSLER, SETH. Nation. 2/15/2016, Vol. 302 Issue 7, p 12-21
âWhen Fagardo-Saucedo arrived at Reeves, a prison complex in rural West Texas, he entered a little-known segment of the federal prison system. Over the previous decade, elected officials and federal agencies had quietly recast the relationship between criminal justice and immigration enforcement. These changes have done as much to bloat the federal prison population as the War on Drugs; they have also helped make Latinos the largest racial or ethnic group sentenced to federal custodyâ (Freed Wessler, 2016, p 13).
A CRIMINAL QUARTET: THE SUPREME COURT’S RESOLUTION OF FOUR CRITICAL ISSUES IN THE CRIMINAL JUSTICE SYSTEM.
Academic Journal
By: Klein, Richard. Touro Law Review. 2013, Vol. 29 Issue 3, preceding p 603-631
âWhereas it was common knowledge that the vast majority of cases in the criminal courts of this country are resolved by plea bargaining, the Court had never required that court-appointed
counsel provide competent advice when recommending rejection of a plea offer by the prosecutionâ (Klein, 2013, p 603).
California Prison Downsizing and Its Impact on Local Criminal Justice Systems.
Academic Journal
By: Petersilia, Joan. Harvard Law & Policy Review. 2014, Vol. 8 Issue 2, p327-357
âProbation officials were the most optimistic about Realignment and
hoped that after a reasonable transition time and the institutionalization of
better rehabilitation programming, counties will be able reduce their jail
populations without compromising public safety. Doing so will require the
use of risk assessments, better coordination of decision-making and informa-
tion-sharing among state and county agencies, and more innovative and cost-
effective use of alternatives to incarceration. Some counties are succeeding
with their new responsibilities and funding, and their success can provide a
blueprint for other counties on how to reduce offender recidivismâ (Petersilia, 2014, p 329).
Key Words: Criminal Justice; Policies, Racial Policing, Racial Injustice, Poverty, Courts, Terry v. Ohio, Bail, Immigration, Plea Bargaining, Prison Downsizing
Woulfe, M., Manzke, M.,(2016). A hybrid fixed-function and microprocessor solution for high-throughput broad-phase collision detection. EURASIP Journal on Embedded Systems, 2017(1), 1-15
âWe present a hybrid system spanning a fixed-function microarchitecture and a general-purpose microprocessor,designed to amplify the throughput and decrease the power dissipation of collision detection relative to what can be achieved using CPUs or GPUs alonâ (Woulfe, M. Manzke, M.,2016 ,P.1).
âCollision detection is found in computer games, animation, robotics and computer-aided design (CAD).An improvement in collision detection will benefit myriad applications.â(Woulfe, M. Manzke, M.,2016 ,P.1).
âAlgorithms can be executed on fixed-function microarchitectures on platforms such as application-specific integrated circuits (ASICs)or on general-purpose microprocessors such as CPUs and GPUs. Microarchitectures sacrifice programmability to dissipate less power and exhibit superior throughput. These advantages result from providing the designer with complete control over component layout and from eliminating the overhead of executing instructionsâ(Woulfe, M. Manzke, M.,2016 ,P.1).
Keywords
Microarchitecture, Collision detection, cpu, Gpu, Algorithms
Danowitz, A., Kelley, K., Mao, J., Stevenson, J. P., Horowitz, M.,(2016). CPU DB: Recording Microprocessor History. ACM Queue, 10(4), 1-15
âIn November 1971, Intel introduced the worldâs ïŹrst single-chip microprocessor, the Intel 4004. It had 2,300 transistors, ran at a clock speed of up to 740 KHz, and delivered 60,000 instructions per second while dissipating 0.5 wattsâ (Danowitz, A., et al., 2012, p1).
âTodayâs microprocessor chips employ billions of transistors, include multiple processor cores on a single silicon die, run at clock speeds measured in gigahertz, and deliver more than 4 million times the performance of the original 4004â (Danowitz, A., et al., 2012, p1).
â This article sheds some light on this question by introducing CPU DB (cpudb.stanford.edu), an open and extensible database collected by Stanfordâs VLSI (very large-scale integration) Research Group over several generations of processors (and students). We gathered information on commercial processors from 17 manufacturers and placed it in CPU DB, which now contains data on 790 processors spanning the past 40 yearsâ(Danowitz, A., et al., 2012, p1).
âCPU DB allows side-by-side access to performance data for relatively simple in-order processors (up to the mid-1990s) and modern out-of-order processors. One could ask if, at the cost of lower performance, the simplicity of the older designs conferred an efïŹciency advantage. Unfortunately, direct comparisons using the raw data are difïŹcult because, over the years, manufacturing technologies have improved signiïŹcantlyâ(Danowitz, A., et al., 2012, p3)
Keywords
Intel 4004, CPU DB, performance data
Egwaile, J. O., Osayamen, F. O.,(2014). MICROPROCESSOR CONTROLLED CAPACITOR BANK SWITCHING SYSTEM FOR SMART DISTRIBUTION NETWORKS. Nigerian Journal of Technology, 33(3), 318-323
âthe circuit was able to switch on the capacitor bank automatically when voltage on the line drops below the preset value, thus helping to ensure that the voltage on the line stays within the acceptable valueâ(Egwaile, J. O, et al., 2014, p318). ~the capacitor bank system is keep current above the preset value.
âThis system was implemented by the use of discreet components such as resistors, capacitors, transistor, diode, automatic voltage regulator, with the PIC16F876A microcontroller programmed in micro basic language serving as the main control centre. The microcontroller sends the relevant control signals to the relays to either switch on or switch off the banks when the volage outside allowable limits. When the voltage returns to normal, it also switches off the capactor banks to avoid voltage on the linesâ (Egwaile, J. O, et al., 2014, p318).~ microprocessor is the central control circuit in capacitor bank switching system.
âIt would be very useful to utility providers as it will automatically switch âONâ or switch âOFFâ the
banks anytime the voltage on the line goes outside acceptable limitsâ(Egwaile, J. O, et al., 2014, p322).
key words:
Microcontroller, capacitor bank switch system, PIC16F876A microcontroller, basic language
Urban, R., Vierhaus, H., T., Schölzel, M., Altmann, E., Seelig, H.,(2016). Non-Cyclic Design Space Exploration for ASIPs – Compiler-Centered Microprocessor Design (CoMet). Journal of Circuits, Systems & Computers, 25(3), 1-16
âthe encoding of operations must be specified. In the early phases of the design process many of these details, which are needed to describe the full specification, must not be known, but they are required for
deriving tools like the compiler and assemblerâ(Urban, R., et al. 2016, P.2).
âThe compiler translates a C program code into an intermediate code format, which can be simulated and profiled immediatelyâ (Urban, R., et al. 2016, P.3).
âThe sequence of code refinements and optimizations performed by the translation modules will compose a compiler backend. In a final step, CoMet provides an automatic translation of the simulator configuration, which specifies the instruction set architecture (ISA), into a VHDL modelâ(Urban, R., et al. 2016, P.3).
âThere are many approaches to support an efficient DSE for application specific processors. In most cases, architecture description languages (ADLs) are used to describe the ISA or a structural design3 of the processor. Examples for ADLs which describe ISA are LISA, ISPS and nML. LISA is used for example in the Processor Non-Cyclic DSE for Small ASIPs â Compiler-Centered Microprocessor Design (CoMet) Designer from CoWare (Synopsys). It provides a toolset based on LISA, which supports the designer during the DSE and reduces the effort for tool customization. For example, assembler and instruction set simulator can be generated automatically. A compiler may be generated as well by specifying additional information for code selectionâ(Urban, R., et al. 2016, P.3-4).
âThe parameters of the architecture are determined by fixed optimization techniques. In that way the compiler is a tool, which can only provide a predeÂŻned and strong limited DSE for ASIPsâ (Urban, R., et al. 2016, P.4).
Keywords
compiler, assembler, C program code, instruction set architecture(ISA), VHDL, DSE, architecture description languages(ADL), LISA, ISPS, nML, ASIPs.
Title: Practical Professional Books from Elsevier : Practical Electrical Network Automation and Communication Systems (1)
Contributor: Strauss, Cobus
Publisher: Newnes
Date Published: October 2003
Strauss, C. (2003). Practical Professional Books from Elsevier : Practical Electrical Network Automation and Communication Systems (1). Jordan Hill, GB: Newnes. Retrieved from http://site.ebrary.com/lib/citytech/reader.action?docID=10169666
âThe term SCADA is the abbreviation for supervisory control and data acquisition. It encompasses the collection of information (data acquisition), transferring the data over physical mediums (the field of telemetry/data communication) and the processing and display of the data at the master station. The master station is also used for centralized control over the communication network and/or to initiate external commandsâ (Strauss, 2003, p. 108).
âThe term SCADA master is commonly used to refer to the master station, including the hardware and software. SCADA masters were originally only intended to communicate to remote terminal units (RTUs), as the master station and the RTU formed the core of a comprehensive SCADA philosophy. Thereafter, SCADA software was developed to communicate to programmable logic controllers (PLCs) and nowadays SCADA software is available that can communicate to virtually any device capable of advanced communications (Strauss, 2003, p. 108).
Title: IDC Technology : Practical SCADA for Industry (1)
Contributors: Bailey, David, Wright, Edwin
Publisher: Newnes
Date Published: June 2003
Bailey, D., & Wright, E. (2003). IDC Technology : Practical SCADA for Industry (1). Jordan Hill, GB: Newnes. Retrieved from http://site.ebrary.com/lib/citytech/detail.action?docID=10169796
âSCADA (Supervisory Control and Data Acquisition) has been around as long as there have been control systems. The first âSCADAâ systems utilized data acquisition by means of panels of meters, lights and strip chart recorders. The operator manually operating various control knobs exercised supervisory control. These devices were and still are in used to do supervisory control and data acquisition on plants, factories, and power generating facilitiesâ (Bailey & Wright, 2003, p. 1).
âIn the early days of data acquisition, relay logic was used to control production and plant systems. With the advent of CPU and other electronic devices, manufacturers incorporated digital electronics into relay logic equipment. The PLC or programmable logic controller is still one of the most widely used control systems in the industryâ (Bailey & Wright, 2003, p. 2).
Cai, N., Wang, J., & Yu, X. (2008). SCADA system security: Complexity, history and new developments. Industrial Informatics, 2008. INDIN 2008. 6th IEEE International Conference on, 569-574. Retrieved from http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4618165&isnumber=4618046
âThe old stand-alone SCADA systems were not linked to other systems and computer networks. Their communication mechanisms and protocols are most likely proprietary. For example, Honeywellâs early TDC-3000 DCS has Local Control Network (LCN), which is similar to IEEE 802.4. The second generation of SCADA systems has integrated management systems and control systems within an enterprise or a company. The control system networks were connected to Management Information System (MIS) networks and became a part of the Intranet in an enterprise. The second generation is also called Intranet-based SCADA. Todayâs SCADA systems, i.e. Internet-based SCADA or third generation SCADA, which are integrated with Enterprise Resource Planning (ERP) system as shown in Figure 1, have full integration with corporate IT networks which are interconnected with Internet. Operators can remotely monitor and control stations and devices such as RTUs and IEDs over the Internetâ (Cai et al., 2008, p. 569).
âThe security of SCADA systems is found to be more complicated than that in the traditional IT or Internet world. The early conventional SCADA designs do not provide industrial systems with the protection against cyber attacks. Old control system facilities are still in use today and they are fully or partially connected to corporate IP networks extending to Internetâ (Cai et al., 2008, p. 570).
Title: Woodhead Publishing Series in Food Science, Technology and Nutrition: Robotics and Automation in the Food Industry: Current and Future Technologies Contributor: Caldwell, Darwin G
Publisher: Woodhead Publishing
Date Published: December 2012
Caldwell, D. G. (Ed.). (2012). Woodhead Publishing Series in Food Science, Technology and Nutrition: Robotics and Automation in the Food Industry: Current and Future Technologies. Cambridge, GB: Woodhead Publishing. Retrieved from http://site.ebrary.com/lib/citytech/reader.action?docID=10767190
âThe reliability, flexibility, and scalability of SCADA have made it an attractive choice when automating complex systems. SCADA has already been used successfully in a broad range of industries, ranging from energy production to factory automation to agriculture. In each case, the specific application required that various types of hardware be connected and communicate efficiently in order to perform their operationâ (Caldwell, 2012, p. 134).
Keywords: Supervisory Control and Data Acquisition, SCADA master, Remote terminal units, telemetry, control Systems, strip chart recorders, distributed control, field buses, industrial control, programmable logic controllers, SCADA system security, control network security, communication system control, data security, electrical equipment industry, IP networks, relay logic, complex systems,
Listed below are seven of the eight library sources needed for Project 2 research.
Thompson, K. (2013, February 1). Staying power. Popular Science, 282(2), p.39-42.
âA modern grid, capable of creating and delivering efficient, reliable power even in the midst of disaster, is long overdueâ (Thompson, 2013, p.40).
âSuch infrastructure would be more resilient to both storms and terrorist attacks, which the National Research Council warned in November could cripple entire regions of the country for monthsâ (Thompson, 2013, p.40).
ââNatural-gas systems also kept much of the Princeton University campus and a sprawling Bronx apartment complex known as Co-op City up and running. Critical services such as hospitals, hotels, and fire stations should all have self-sufficient power generation,â says Kellyâ (Thompson, 2013, p.43).
Keywords: Electric grid, power generation
Alexander, D. (2012, October 1). Electric developments for the infantry. Military Technology, 36(10), pp.46-48, 65-67.
âIntegrated power systems for military land vehicles has become a key element of next generation designsâ (Alexander, 2012, p.46).
âCollectively called MEP, military electric power generation and distribution systems come in a variety of sizes, shapes and attributes, but all play critical roles in force protection and force sustainment operations in fixed or mobile settingsâ (Alexander, 2012, p.65).
Keywords: MEP/military electric power
Blake, B. (2009, May 1). Grid unlocked. Washington Monthly, 41, p.A9-A13.
âTypically, putting up rooftop solar panels also means installing a tangle of wires, inverters, batteries, and other gadgetsâ (Blake, 2009, p.9).
âThe lack of innovation means grid operators have to rely on crude tools to manage the flow of electricity and diagnose and repair problemsâ (Blake, 2009, p.11).
âAdding digital intelligence to electric devices also opens the way for sweeping innovation in dozens of other industries, from automaking to appliance manufacturingâ (Blake, 2009, p.12).
Keywords: Solar panels, digital intelligence
Roman, H, T. (2005, March 1). Transformers and the electric utility system. Tech Directions, 64(8), p.22-25.
âTransformers are the main components of a modern electric power systemâ (Roman, 2005, p.22).
âThey easily convert alternating current and voltage to a variety of levels, making it economical to transport electricity over long distancesâ (Roman, 2005, p.22).
âLarge electric generators at a modern power station generally produce electricity at voltages of 10,000-20,000 V, with currents of 15,000-25,000Aâ (Roman, 2005, p.24).
âMost domestic appliances in the home use 120V, while high current ones like air conditioners, electric clothes dryers and electric ranges need 240V to operateâ (Roman, 2005, p.25).
Keywords: Transformers, electric generators, voltage, current
Moran, A. (2006, December 1). Energy in the market: the unfounded concerns about privatised electricity. Institute of Public Affairs Review, 58(4), p.30-32.
âA dozen years ago, virtually all electricity in Australia was generated in government-owned plants, transmitted along government-owned facilities and marketed by
government-owned retailersâ (Moran, 2006, p.30).
âThe productivity of the generators has increased considerably, with the outstanding improvement having been the privatised Victorian system, both in terms of output per employee and reliabilityâ (Moran, 2006, p.31).
âThe main problems for future supply stability stem from government activitiesâ (Moran, 2006, p.32).
Terrell, R. (2016, November 21). The Great Smart Meter Con. New American, 32(22), p.17-20.
âIn the cross hairs of an attack are smart meters, digital devices that replace traÂditional automated utility meters at individual homes and businessesâ (Terrell, 2016, p.17)
âThey can be read frequently, improving accuracy in recording electric power use, and they are read remotely, without utilities sending a person to document each measuring device
in the networkâ (Terrell, 2016, p.17).
âLike cellphones, smart meters transmit and receive information wirelessly. If you have a smart meter, it works by âcallingâ your utility companyâsometimes called âchirpingââvia a one or two-watt wireless radio at least once a day to deliver up-to-date readings of energy usageâ (Terrell, 2016, p.20).
Keyword: Smart meter
Moore, A. T., Kiesling, L. (2001, February 1). Why californiaâs power âexperimentâ failed. Consumersâ Research Magazine, 84(2), p.10-15.
âIn 1966, Californiaâs legislature unanimously passed a law that allegedly sought to deregulate the stateâs electricity marketâand promised, amidst great fanfare and rhetoric, to usher in a new era of consumer choice and savingsâ (Moore and Kiesling, 2001, p.10)
TO: Professor Ellis
FROM: Demi Huang
DATE: April 6, 2017
SUBJECT: Project 2: Research Logbook
McNeal, L. R. (2016). Managing our blind spot: the role of bias in the school-to-prison pipeline. Arizona State Law Journal, 48(2), 285-311. Retrieved from http://search.ebscohost.com.citytech.ezproxy.cuny.edu:2048/login.aspx?direct=true&db=lgs&AN=117173090&site=ehost-live
âAlthough originally created for the adult criminal justice system, zero tolerance rhetoric eventually emerged in the Kâ12 schooling context to address drug and gang activity. However, over time zero tolerance policies were expanded to include minor misconduct such as wearing hats inside the school building and class disruptions. This paradigm shift from developmentally appropriate responses to addressing student misconduct to a more punitive approach was further solidified by Congressâs adoption of the 1994 Guns Free Act. The legislative intent of this Act was to minimize the perceived threat of escalations in school violence by school officials and the general publicâ (McNeal, 2016)
—
Nance, J. P. (2016). Students, police, and the school-to-prison pipeline. Washington University Law Review, 93(4), 952+. Retrieved from http://go.galegroup.com.citytech.ezproxy.cuny.edu:2048/ps/i.do?p=AONE&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA463400088&asid=d788a326a3e616603c6c977e3ae76a70
âOne also should not underestimate the negative impact of suspending or expelling a student. Excluding a student from school, even for a short time period, disrupts that student’s educational experience and provides that student with more time and opportunities to engage in harmful or illegal activities. Ample studies demonstrate that a suspended student is less likely to advance to the next grade level or enroll in college and is more likely to drop out, commit a crime, get arrested, and become incarcerated as an adultâ (Nance, 2016)
—
Anonymous (2013, January 2). Seeing kids as kids; new group focused on juvenile justice system. The Indiana Lawyer. Retrieved from http://www.lexisnexis.com.citytech.ezproxy.cuny.edu:2048/lnacui2api/api/version1/getDocCui?lni=57SS-2V91-F164-00M9&csi=270944,270077,11059,8411&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true
âOne main entrance to the juvenile justice system is school. Suspensions and expulsions have replaced detention, and offenses on school grounds are often leading to arrests of children and incarceration. Minority and special needs students are impacted disproportionally by school discipline policies in Indiana and throughout the countryâ (Anonymous, 2013).
—
Gutiérrez, A. (2015). School-to-prison pipeline: personal and professional experiences. Latinos and Latinas at Risk: Issues in Education, Health, Community, and Justice, 2, 528-542. Retrieved from http://go.galegroup.com/ps/i.do?p=GVRL&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CCX6175400090&asid=fe4a2914cadb4666afbdf6c64e7a7a82
âWith such a favorable student-teacher ratio, one might expect the opportunity for significant educational strides. However, odd as it may sound, offender students were often not permitted to attend class as a form of punishment by Probation. Ironically, some of these students were originally incarcerated for not attending school. Considering the class size, I wondered why students were assigned what seemed to be elementary level handouts as opposed to receiving rigorous instruction in the detention facilitiesâ (GutiĂ©rrez, 2015, p. 533).
—
Maller, D. (2014). School-to-prison pipeline. Race and Racism in the United States: An Encyclopedia of the American Mosaic, 3, 1099-1101. Retrieved from http://go.galegroup.com/ps/i.do?p=GVRL&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CCX3160000581&asid=00418b1e9d5792eb5ee066250084e894
âMarginalized children, when labeled by the school system as âdeviantâ at a young age, may feel that they are not wanted, or valued, or smartâwhich puts them on a downward spiral from the beginning of their school experiences. Many begin to mentally drop out as early as the third or fourth grade, when the academic and behavioral demands of school may outstrip their earlier academic development and home-based support. Lack of mental health support and early intervention for children with severe emotional and behavioral problems and their families, issues of substance abuse, the absence of a positive home-based support system, or a combination of these factors often bring children into the juvenile justice system. The deeper a child gets into this system, the harder it is to get out. Once expelled from the school system, it is difficult for the child to return, making the risk of dropping out of high school a very real possibility. High school dropouts are 63 times more likely to be incarcerated than graduates from four-year collegesâ (Maller, 2014, p. 1100).
—
Scully, J. A. M. (2016). Examining and dismantling the school-to-prison pipeline: strategies for a better future. Arkansas Law Review, 68, 959-1010. Retrieved from http://www.lexisnexis.com/lnacui2api/api/version1/getDocCui?lni=5JMH-5R90-00CT-V193&csi=270944,270077,11059,8411&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true
âThe final component of the pipeline was solidified as public school teachers began to feel the pressure of the No Child Left Behind Act, a law that required schools to have students perform at certain levels or face serious sanctions such as the loss of funding or the closing of the school entirely. With such serious consequences looming, teachers and administrators began to eliminate low-performing students by suspending them, transferring them to alternative programs, and/or expelling them. By eliminating these students, the schools protected their performance evaluations and made clear just how disposable some children are. As a consequence of these policies, students of color and children with learning disabilities found themselves disproportionately locked into the pipeline at alarming ratesâ (Scully, 2016, pp. 961-962).
âIn the 1990s, John J. Dilulio’s myth of the “superpredator” was born – a generation of kids described as the worst generation of criminals that society had ever seen. According to Dilulio, superpredators were ruthless sociopaths, with no moral conscience, that saw crime as a rite of passage and were undeterred by any sanctions. He warned society that superpredators would be coming in waves, flooding the nation’s streets over the next twenty years. “Time is running out,” he cautioned, as he urged the American public to devise strategies to limit their damageâ (Scully, 2016, p. 964).
âSeveral popular magazines featured stories on the predicted crime wave that these superpredators would cause. These articles featured photographs of Black boys holding handguns. Stories exacerbating fear of Black youth ran rampant. The American public embraced the superpredator myth and called for harsher sanctions against children committing crimes. Their chant “adult crime, adult time” became the mantra of legislators who dedicated themselves to trying children in adult criminal court. The most dangerous part of the superpredator construct was that it focused policymakers’ attention solely on the offenders, ignoring external social factors that contributed to the violent acts of juveniles. If a child’s DNA were responsible for the child’s bad behavior, there would be no need to fix the surrounding environment. There would be no need to address failing schools, police violence, substandard housing, dysfunctional families, or a lack of drug treatment centers. In fact, if children were genetically damaged beyond repair, the only solution would be to lock them up; there would be no need to invest in rehabilitation or delinquency programs, as the children would be inherently violent and would forever remain that wayâ (Scully, 2016, pp. 965-966).
âIn response to Dilulio’s warnings, policymakers in nearly every state changed the way the justice system responded to juveniles accused of committing crimes. Penalties for juvenile crimes increased, more juvenile acts became criminalized, and states empowered prosecutors and judges to transfer children from juvenile court into the adult criminal system, where they faced the harshest consequences in American history. With the advent of these changes, children who were once deemed capable of redemption were, for all intents and purposes, considered to be garbage, worthy of nothing but disposal. The public’s fear of youth grew, resulting in the implementation of harsh policies designed to combat these superpredatorsâ (Scully, 2016, pp. 966-967).
âTrivial offenses such as bringing a water gun or a plastic axe to school were punished under zero tolerance policies. Some students received out-of-school suspensions for being late, skipping school, and for asking too many questions […] The use of zero tolerance policies is so widespread and outrageous that many of these extremely punitive incidents occur as early as pre-school and elementary school, setting the tone for young children to expect severe discipline. Research indicates that the earlier children are exposed to the criminal justice system, the more likely they are to be caught in a cycle of criminal activity resulting in the commission of crimes later in lifeâ (Scully, 2016, pp. 969-970).
âSimilarly, a six-year-old in Florida, Desre’e Watson, was arrested for throwing a temper tantrum at school. She was transported to the juvenile detention center, where she was fingerprinted and had a mug shot taken. A large number of elementary and middle school children between the ages of ten and thirteen have also been impacted. Consider the following cases:
An Ohio fifth grader was suspended from his elementary school for three days because he pointed his finger in the shape of a gun and pulled an imaginary trigger while playing with his friends; the letter from the principal to the parents cited his finger as a “level 2 lookalike firearm.”
A twelve-year-old junior high school student in New York City was handcuffed and escorted to the local precinct station for doodling on her desk with an erasable marker.
A thirteen-year-old girl in New York City was taken from school in handcuffs because she wrote the word “Okay” on her desk.
An eleven-year-old was charged with “criminal mischief” for breaking a knick-knack on his teacher’s desk in Arapahoe County, Colorado.
A thirteen-year-old student in Florida was arrested for repeatedly “passing gas” and turning off his classmates’ computers during class.
A thirteen-year-old boy in Colorado was arrested and charged with “unlawful sexual contact” after he tapped his friend on the bottom for making a good play during a basketball gameâ (Scully, 2016, pp. 970-971).
—
Keywords: school to prison pipeline, no child left behind
TO: Professor Ellis
FROM: Leonardo Calegare
DATE: April 6, 2017
SUBJECT: Project 2, Research Logbook Update
*Sanctuary Cities and Secure Communities
Haymes, M.V., & Haymes, S. (2014). Sanctuary Cities and Secure Communities. In Undocumented Immigrants in the United States: An Encyclopedia of Their Experience. (Vol. 2, pp.625-629). Santa Barbara, CA: Greenwood.
âSanctuary cities are municipalities that have policies and /or practices that in general ask city employees to refrain from actions that can contribute to the deportation of undocumented immigrants in their community. Cities with formal sanctuary policies generally instruct city employees and agencies to neither make inquiries about the immigration status of individuals seeking services or the protection of its laws, nor report on the immigration status of the individual to the Department of Homeland Securityâs (DHS) Immigration and Customs Enforcement (ICE), nor use city resources to enforce federal immigrant legislation.â ( Haymes & Haymes, 2014, p. 625).
âMore specifically, sanctuary policies generally specify that local law enforcement officers do one or more of the following: â(1) limit inquiries about a personâs immigration status unless investigating illegal activity other than mere status as an unauthorized alien (âdonât askâ); (2) limit arrests or detentions for violation of immigration laws (âdonât enforceâ); and (3) limit provision to federal authorities of immigration status information (âdonât tellâ).â ( Haymes & Haymes, 2014, p. 625).
*Immigration Law
Weiss, M.J. (2010). Immigration law. In Encyclopedia of American Immigration. (Vol. 2, pp. 549-552). Pasadena, CA: Salem Press.
âBranch of law that deals with the entry and settlement of alien nationals in the United Statesâ (Weiss, 2010, p. 549).
âPrimarily because of the need for labor and the spacious frontier, there was unrestricted immigration during the first one hundred years of the U.S. governmentâs existence. After the Civil War, federal law began to reflect restrictions on the immigration of certain groups, and in 1875 Congress passed a law barring convicts and prostitutes from admission. These were among the first of many âquality controlâ exclusions based on the nature of the immigrants. The list of unacceptable types of immigrants continued to grow in subsequent legislation. The Immigration Act of 1882, considered the first-general federal immigration act, added âlunatics,â âidiots,â and those likely to become public charges to the exclusionary list. â (Weiss, 2010, p. 549).
*Immigration and Customs Enforcement (ICE)
Muñoz, R.G. (2014). Immigration and Customs Enforcement (ICE). In Undocumented Immigrants in the United States: An Encyclopedia of Their Experience. (Vol. 1, pp. 368-372. Santa Barbara, CA: Greenwood.
âICE is the acronym for Immigration and Customs Enforcement, the agency responsible for the enforcement of immigration law in the U.S. interior. ICE was formed in 2003 as a result of a governmental reorganization that merged the Immigration and Naturalization Service (INS) and the U.S. Customs Service and gave the newly formed Department of Homeland Security (DHS) oversight over immigration matters. With a $5.8 billion annual budget (as of 2012) and more than twenty thousand employees across the United States and in 48 other countries, ICE is the second largest investigative agency of the U.S. federal governmentâ (Muñoz, 2014, p. 368).
âFor unauthorized immigrants, widespread collaboration between ICE and local law enforcement reduces the ability to travel within the United States, even to and from work, and to be in public spaces without fear of deportation. This has ramifications for work, social life, consumption practices, and overall quality of life of unauthorized people. For example, unauthorized immigrants in highly policed areas are more likely to accept a job with poor working conditions that is close to their home, rather than risk traveling to search for a better job. Unauthorized immigrants may also concentrate in relatively safe spaces, such as urban communities, rather than in suburban or rural areas in which local police actively cooperate with ICE. As ICE pushes to make Secure Communities mandatory across the United States, these effects are likely to multiply.â (Muñoz, 2014, p. 371).
Keywords: Sanctuary Cities, Immigration Law, Immigration and Customs Enforcement (ICE),
To: Professor Ellis
From: Sonja Goulbourne
Date: 4/6/2017
Subject: Research Log Book
Research Paper Topic: Criminal Justice Reform
1. New York Times Online
Foreman, J. (2017,March 25). Justice Springs Eternal. The New York Times, OPINION; Pg. 1
âIn 2015, the number of American prisoners declined more than 2 percent, the largest decrease since 1978. By 2014, the incarceration rate for black men, while still stratospheric, had declined 23 percent from its peak in 2001. Even growing numbers of Republicans were acknowledging the moral and fiscal imperative of shrinking the prison state.â (Foreman, 2017)
Retrieved From: https://www.nytimes.com/2017/03/25/opinion/sunday/justice-springs-eternal.html?_r=0
2. American Civil Liberties Union
ACLU. (2017, April 6) Criminal Justice Reform
âWhat You Need To Know:
790%The federal prison population has increased by almost 790 percent since 1980.
3.73 In the United States, a black person is 3.73 times more likely to be arrested for marijuana possession than a white person is, despite approximately equal rates of use.
3,278 At least 3,278 people were serving life sentences without parole for drug, property, and other nonviolent crimes in 2012.â (ACLU, 2017)
Retrieved from: https://www.aclu.org/search/%20?f%5B0%5D=field_issues%3A36&f%5B1%5D=type%3Aasset&f%5B2%5D=field_asset_type%3Areport
3. Huffington Post
Hines, R. (2016, April 22) Trumpâs election and criminal justice reform.
âTrump has referred to nonviolent offenders who benefited from recent sentencing reforms as âdangerous drug-trafficking felons and gang members who prey on civilians.â He has also said he wants to pass new federal mandatory minimums for nonviolent offenders in his first 100 days in office.â (Hines, 2016)
Retrieved from: http://www.huffingtonpost.com/regan-hines/trumps-election-and-crimi_b_13013280.html
4. Washington Post
Horwitz, S. Lower; W. Newman Tony, R. (2016) Obamaâs crusade against a criminal justice system devoid of âsecond chances.
âIn July 2015, six-and a half years into his presidency, Obama gave his first major criminal justice speech to a crowd of more than 3,000 at the NAACP convention in Philadelphia. He declared that the U.S. criminal justice system was not as âsmartâ as it needs to be: âItâs not keeping us as safe as it should be. It is not as fair as it should be. Mass incarceration makes our country worse off, and we need to do something about it.â (Horwitz, 2016)
Retrieved from: https://www.washingtonpost.com/graphics/national/obama-legacy/racial-profiling-criminal-justice-reform.html
5. Alexander M. (2010) The New Jim Crow: Mass Incarceration in the Age of Colorblindness
âThe fact that more than half of the young black men in many large American cities are currently under the control of the criminal justice system (or saddled with criminal records) is notâas many argueâjust a symptom of poverty or poor choices, but rather evidence of a new racial caste system at work.â (p 16)
6. Hirsch, Adam Jay (1992). The Rise of the Penitentiary: Prisons and Punishment in Early America. New Haven, CT: Yale University Press.
TO: Professor Ellis
FROM: Isaiah Emanuel
DATE: April 6, 2017
SUBJECT: Project 2, Research Logbook
1)
Multivariable control of a test bed for differential gears.
Detail Only Available
Academic Journal
By: Forstinger, Martin; Bauer, Robert; Hofer, Anton; Rossegger, Wilfried. Control Engineering Practice. Dec2016, Vol. 57, p18-28. 11p. DOI: 10.1016/j.conengprac.2016.08.010.
Forstinger, M., Bauer, R. Hofer, A., Rossegger, W. (2016). Control Engineering Practice. 57, 18-28.
âCommon problems related to the control of power train test beds are the coupling of the two typical controlled variables rotational speed and testing torque as well as resonant torque oscillationsâ (Forstinger et al., 2016, p. 18).
2)
Study of Vibrations in a Short-Span Bridge Under Resonance Conditions Considering Train-Track Interaction.
Full Text Available
Academic Journal
By: Ribes-Llario, Fran; Velarte-Gonzalez, Jose Luis; Perez-Garnes, Jose Luis; Real-HerrĂĄiz, Julia Irene. Latin American Journal of Solids & Structures. 2016, Vol. 13 Issue 7, p1236-1249. 14p. DOI: 10.1590/1679-78252773.
Ribes-Llario, F., Velarte-Gonzalez, J., Perez-Garnes, J., Real-HerrĂĄiz, J. (2016). Latin American Journal of Solids & Structures, 13(7), 1236-1249.
âResonance is a phenomenon of utmost importance in railways engineering, leading to vast damages both in track and vehiclesâ (Ribes-Llario et al., 2016, p. 1236).
3)
Peak Power Demand and Energy Consumption Reduction Strategies for Trains under Moving Block Signalling System.
Full Text Available
Academic Journal
By: Qing Gu; Tao Tang; Fang Cao; Karimi, Hamid Reza; Yongduan Song. Mathematical Problems in Engineering. 2013, p1-11. 11p. DOI: 10.1155/2013/940936.
Qing, G., Tao, T., Fang, C., Karimi, H., Yongduan, S. (2013). Problems in Engineering, 1-11.
âIn the moving block signalling (MBS) system where the tracking target point of the following train is moving forward with its leading train, overload of the substations occurs when a dense queue of trains starts (or restarts) in very close distance intervalâ (Qing et al., 2013, p. 1).
4)
Data-driven train operation models based on data mining and driving experience for the diesel-electric locomotive.
Detail Only Available
Academic Journal
By: Zhang, Chun-Yang; Chen, Dewang; Yin, Jiateng; Chen, Long. Advanced Engineering Informatics. Aug2016, Vol. 30 Issue 3, p553-563. 11p. DOI: 10.1016/j.aei.2016.07.004.
Zhang, C., Chen, D., Yin, J., & Chen, L. (2016). Data-driven train operation models based on data mining and driving experience for the diesel-electric locomotive. Advanced Engineering Informatics, 30(3), 553-563. âTraditional control methods in automatic train operation (ATO) models have some disadvantages, such as high energy consumption and low riding comfortâ (Zhang et al., 2016, p. 553).
5)
Analysis of Handover Trigger Scheme Based on Distance for LTE High-speed Railway Networks.
Full Text Available
Academic Journal
By: Rui Zhang; Muqing Wu; Yifan Zhang. Telkomnika. Mar2016, Vol. 14 Issue 1, p129-135. 7p. DOI: 10.12928/TELKOMNIKA.v14i1.2742.
Rui, Z., Muqing, W., & Yifan, Z. (2016). Analysis of Handover Trigger Scheme Based on Distance for LTE High-speed Railway Networks. Telkomnika, 14(1), 129-135. âIn high-speed railway environment, frequent handovers and high handover failure probability result in serious communication interruptions and call drops, which become pressing problem to be solvedâ (Rui et al., 2016, p. 129).
6)
Design of a Fatigue Detection System for High-Speed Trains Based on Driver Vigilance Using a Wireless Wearable EEG.
Full Text Available
Academic Journal
By: Xiaoliang Zhang; Jiali Li; Yugang Liu; Zutao Zhang; Zhuojun Wang; Dianyuan Luo; Xiang Zhou; Miankuan Zhu; Salman, Waleed; Guangdi Hu; Chunbai Wang. Sensors (14248220). Mar2017, Vol. 17 Issue 3, p1-21. 21p. 8 Color Photographs, 2 Diagrams, 14 Charts, 5 Graphs. DOI: 10.3390/s17030486.
Xiaoliang, Z., Jiali, L., Yugang, L., Zutao, Z., Zhuojun, W., Dianyuan, L., & … Chunbai, W. (2017). Design of a Fatigue Detection System for High-Speed Trains Based on Driver Vigilance Using a Wireless Wearable EEG. Sensors (14248220), 17(3), 1-21. âThe vigilance of the driver is important for railway safety, despite not being included in the safety management system (SMS) for high-speed train safety. In this paper, a novel fatigue detection system for high-speed train safety based on monitoring train driver vigilance using a wireless wearable electroencephalograph (EEG) is presentedâ (Xiaoliang et al., 2017, p. 1).
7)
Predictive modelling of the granulation process using a systems-engineering approach.
Detail Only Available
Academic Journal
By: AlAlaween, Wafa’ H.; Mahfouf, Mahdi; Salman, Agba D. Powder Technology. Nov2016, Vol. 302, p265-274. 10p. DOI: 10.1016/j.powtec.2016.08.049.
AlAlaween, W. H., Mahfouf, M., & Salman, A. D. (2016). Predictive modelling of the granulation process using a systems-engineering approach. Powder Technology, 302265-274. âThe granulation process is considered to be a crucial operation in many industrial applicationsâ (AlAlaween et al., 2017, p. 265).
8)
Adaptive Iterative Learning Control for High-Speed Trains With Unknown Speed Delays and Input Saturations.
Detail Only Available
Academic Journal
By: Ji, Honghai; Hou, Zhongsheng; Zhang, Ruikun. IEEE Transactions on Automation Science & Engineering. Jan2016, Vol. 13 Issue 1, p260-273. 14p. DOI: 10.1109/TASE.2014.2371816.
Ji, H., Hou, Z., & Zhang, R. (2016). Adaptive Iterative Learning Control for High-Speed Trains With Unknown Speed Delays and Input Saturations. IEEE Transactions On Automation Science & Engineering, 13(1), 260-273. doi:10.1109/TASE.2014.2371816 âhe train motion dynamics containing nonlinearities and parametric uncertainties are formulated as a nonlinearly parameterized systemâ (Ji et al., 2016, p. 260).
Keywords: Systems engineering, simulation, train depot, reliability, trains
To: Professor Ellis
From: L. L. Vasconez
Date: April, 6 2017
Subject: Project 2, Research Logbook Update
WHAT IS (AND ISN’T) THE NATIONAL ELECTRICAL CODE?
Author, A. A., Author, B. B., & Author, C. C. (Year). Title of article. Title of Periodical, volume number(issue number), pages. http://dx.doi.org/xx.xxx/yyyyy
Coyle, T. (2000). What is (and isn’t) the National Electrical Code?. Engineered Systems, 17(7), 44.
http://citytech.ezproxy.cuny.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=3376592&site=ehost-live&scope=site
âThe NEC is produced and distributed by the National Fire Protection Association (NFPA).â (Coyle, 2000 , Par. 3).
âIt applies to installation of electrical conductors and equipment in or on almost all public and private buildings and structuresâ (Coyle, 2000 , Par. 3).
âThe purpose of this Code is the practical safeguarding of persons and property from hazards arising from the use of electricityâ (Coyle, 2000 , Par. 4).
âThe safety of an electrical installation involves not only the initial conditions of the installation, but the maintenance and future use of it as wellâ (Coyle, 2000 , Par. 5).
Your Estimate and the National Electrical Code
Your estimate and the national electrical code. (2013, November 15). EC&M Electrical Construction & Maintenance. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA349626451&asid=e186ca65362d2b4b24d5a0ca83ded4c0
âThe NEC is a product of the National Fire Protection Association (NFPA), an organization that writes and produces copyrighted standards and codes for usage and adoption by local governments and agencies.â (Your Estimate, 2013, Par. 4).
âThe NEC is also known as NFPA 70, which covers the standards for safe installation of electrical wiring and equipment.â (Your Estimate, 2013, Par. 4).
âWhile the NEC governs the installation of electrical materials, the ADA governs the mounting heights and locations of devices such as switches and receptaclesâ (Your Estimate, 2013, Par. 5).
âThe NEC is organized by chapter. Chapters 1 through 4 cover installation of items while Chapters 5 through 7 address special occupancy, equipment, or conditions. Chapter 8 covers communications, and Chapter 9 contains tables for references such as wire fill tables.â (Your Estimate, 2013, Par. 6).
-I can use this website http://www.nfpa.org/overview as my 9th source to explain where does NEC comes from.
Voltage Levels and the National Electrical Code
Voltage levels and the national electrical code. (2017, March 10). EC&M Electrical Construction & Maintenance. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA485006321&asid=eca0cf18dec7f1631fcf4e2dd8582fab
âThe terminology — low, medium, and high voltage — are relative to the field you are in and which context is being usedâ (Voltage Levels, 2017, Par. 1).
Improving Safety One Rule at a Time
Improving safety one rule at a time. (2016, November 18). EC&M Electrical Construction & Maintenance. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA470742153&asid=a0c7537ff553fa1dfc8a7c36fc476bd2
â…more than 4,000 proposals and acting on each one of them, the National Fire Protection Association (NFPA) published the 2017 National Electrical Code (NEC)â (Improving Safety, 2016, Par. 2)
What technicians need to know about cable & the NEC: a common myth is that the National Electrical Code only deals with high-voltage electricity. Not true
Stepanek, L. (2007, December). What technicians need to know about cable & the NEC: a common myth is that the National Electrical Code only deals with high-voltage electricity. Not true. Security Distributing & Marketing, 37(12), 71+. Retrieved from http://go.galegroup.com/ps/i.do?p=ITOF&sw=w&u=cuny_nytc&v=2.1&it=r&id=GALE%7CA178400840&asid=7facd7ce12052580b61772a33a8aad8d
âThe National Electrical Code, or NEC, protects the public by establishing requirements for electrical wiring and equipment in virtually all buildingsâ (Stepank, 2007, Par. 2).
TO: Professor Ellis
FROM: Daniel. O. L
DATE: April 6, 2017
SUBJECT: Project 2 Research LogBook Updated
Topic: Patent Reform; Electrical Engineering
This topic is important to understand as it ties the passion of a study to the politics of the businesses world.
IEEE-USA Tells Congress that Patent Reform Is Essential to Economic Recovery.
Detail Only Available
Academic Journal
By: Stern, Richard. IEEE Micro, March/April 2009, Vol. 29 Issue 2, p64-65, 2p; DOI: 10.1109/MM.2009.32
Stern (2009).IEEE-USA Tells Congress that Patent Reform Is Essential to Economic Recovery.IEEE Xplore. 29(2), p.64
http://ieeexplore.ieee.org/document/4812137/
âBut that ability has been impaired, IEEE-USA maintains, because the current management of the Patent and Trademark Office (PTO) and the statutory limitations on the agencyâs authority have resulted in serious ââdisincentives to American inventiveness.ââ (Stern 2009)
Oliver HeavisideâAn inventor who failed to file crucial patents
Detail Only Available
Academic Journal
By: Spear, Brian. World Patent Information. Sep 2006, Vol. 28 Issue 3, p248-250. 3p. DOI: 10.1016/j.wpi.2005.11.002.
Spear (2006). Oliver HeavisideâAn inventor who failed to file crucial patents. World Patent Information. 28(3), p.248â250
http://www.sciencedirect.com/science/article/pii/S0172219005001766
âOliver Heaviside was an inventor who had a good insight into the mathematical basis behind much electrical engineering of the late 19th century. He was also able to apply his theoretical knowledge to practical problems; however, he seems to have had but a single patent. The author seeks to explore the reasons behind Heavisideâs lack of patents to protect and exploit his inventions.â (Spear, 2006)
Post-Grant Review: A Promising New Tool for Invalidating Patents?
Full Text Available
Academic Journal
By: Miller, Jeffrey A.; Scott, Katie J. L.; Phan, Scott. Intellectual Property & Technology Law Journal , Mar2017, Vol. 29 Issue 3, p3-9, 7p, 1 Diagram, 1 Chart, 1 Graph
Miller, Scott, Phan (2017).Post-Grant Review: A Promising New Tool for Invalidating Patents? . Intellectual Property & Technology Law Journal. 29(3) p3-9
http://web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=e624d193-c303-4d7b-aef9-39590802bd13%40sessionmgr4010&vid=0&hid=4002
âWhile Congress intended the PGR process to be similar to European opposition proceedings, to date, PGR has not been nearly as popular. In contrast to the small number of PGR filings, the European Patent Office (EPO) reports that the opposition rate in 2015 for granted European patents was 4.4 percent, and in that same year, the EPO issued 3,713 opposition decisions.â (Miller et al. , 2017, p 3)
Software Patents Are Falling Down.
Full Text Available
Academic Journal
By: Samuelson, Pamela. Communications of the ACM, Nov2015, Vol. 58 Issue 11, p27-29, 3p, 1 Color Photograph; DOI: 10.1145/2822511
Samuelson (2015).Software Patents Are Falling Down. . COMMUNICATIONS OF THE ACM. 58(11), p.27
http://web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=8125e100-d9c4-4b61-89dc-6737b305e4a2%40sessionmgr4009&vid=0&hid=4002
âNovel and nonobvious machines, manufactures, compositions of matter, and processes are eligible for patenting so long as these subject matters are properly claimed and vetted through the patent examination process. Because software is a virtual machine and a technological process, some contend that software innovations should always qualify as pat-
entable inventions. However, since the Supreme Courtâs decision in Gottschalk v. Benson in 1972, this contention has been, in a word, contentiousâ (Samuelson, 2015, p 27)
Keywords : United States Patent and Trademark Office, Intellectual Property, Engineering,
TO: Professor Ellis
FROM: Win Naing
DATE: April 6, 2017
SUBJECT: Project 2, Research Logbook Update
Research on Info-graphics:
âPeople learn and remember more efficiently and effectively through the use of text and visuals than through text alone. Infographics are one way of presenting complex and dense infor-
mational content in a way that supports cognitive processing, learning, and future recognition and recollection.â
Dunlap, J. C., & Lowenthal, P. R. (2016). Getting graphic about infographics: design lessons learned from popular infographics. Journal Of Visual Literacy, 35(1), 42-59. doi:10.1080/1051144X.2016.1205832
Microelectronics: Differential Amplifiers.
Full Text Available
Periodical
By: EMILIO, MAURIZIO DI PAOLO. Electronics World, Feb2014, Vol. 120 Issue 1934, p42-43, 2p
Emilio, M. (2014). Microelectronics: differential amplifiers. Electronics World, 120(1934), 42-43
Quote: âMicroelectronics has changed our lives,with mobile phones, digital cameras, laptop computers and other devices becoming an integral partâ ( Emilio, 2014, p.42).
Source Citation (MLA 8th Edition)
“Microelectronics Industry.” International Encyclopedia of the Social Sciences, edited by William A. Darity, Jr., 2nd ed., vol. 5, Macmillan Reference USA, 2008, pp. 136-139. Gale Virtual Reference Library, go.galegroup.com/ps/i.do?p=GVRL&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CCX3045301543&it=r&asid=32c02286d1fe73aa0a0432ee622b5268. Accessed 6 Apr. 2017.
Darity, W. (2008). Microelectronics industry. In William D. (Ed.), International encyclopedia of the social sciences (pp.136-139). Detroit, MI: Macmillan Reference USA
Quote: âMany aspects of the telecommunications industry, such as bandwidth, the speed at which data can be transmitted, the use of high-speed fiber optic cable, and satellite and wireless communications, rely on the microchip in one way or anotherâ ( Darity, 2008, p.137).
Source Citation (MLA 8th Edition)
Dickerson, Louise. “Microtechnology.” The Gale Encyclopedia of Science, edited by K. Lee Lerner and Brenda Wilmoth Lerner, 5th ed., vol. 5, Gale, 2014, pp. 2804-2807. Gale Virtual Reference Library, go.galegroup.com/ps/i.do?p=GVRL&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CCX3727801564&it=r&asid=6175ac778ec8d11adcfa72e981376f9d. Accessed 6 Apr. 2017.
Dickerson, L. (2014). Microtechnology. In K.L. Lerner & B.W. Lerner (Eds.), The gale encyclopedia of science (pp.2804-2807). Farmington Hills, MI: Gale
Quote: âMicrotechnology has the advantages of taking up less space, using less construction material, and costing less moneyâ (Dickerson, 2014, p.2804-2807).
Source Citation (MLA 8th Edition)
“Miniaturization.” Space Sciences, edited by John F. McCoy, 2nd ed., vol. 4: Our Future in Space, Macmillan Reference USA, 2012, pp. 184-188. Gale Virtual Reference Library, go.galegroup.com/ps/i.do?p=GVRL&sw=w&u=cuny_nytc&v=2.1&id=GALE%7CCX4019600320&it=r&asid=5e0dd68d6b1058e829baab97b5563606. Accessed 6 Apr. 2017.
McCoy, J.F. (2012). Miniaturization. In J.F. McCoy (Ed.), Space Sciences (pp.184-188). Detroit, MI: Gale
Quote: âNanotechnology innovations in computer design can help shrink systems” (McCoy, 2012, p. 185).
Keywords: Microelectronics, Integrated Circuits, Exobiology, Microprocessor
TO: Professor Jason W. Ellis
FROM: Ronald C. Hinds
DATE: April 06, 2017
SUBJECT: Project 2, Research
HISTORY OF TECHNICAL WRITING
Longo, B. (2000). Spurious Coin: A History of Science, Management, and Technical Writing. Technical Communication Quarterly, 105-107.
Longo argues âthat the writing part of technical communication emerged in history primarily as a medium for making scientific knowledge useful to the capitalist production system. It does so by translating the abstractions of science into useful economic outputâ (Longo, 2000. p.105).
Keywords: Abstractions, economic output, medium.
Ramsey, R. D. (1993). Supervision.
National Research Bureau, 54.7. p.3.
PREPARATION FOR âEDITINGâ
âFinally, hiring managers and professionals share different perceptions of error. Understanding these differences can produce better assessment tools and better prepare test takersâ (Ramsey, 1993. p.3).
Keywords: Perceptions of error, assessment tools, test takers
Russell, D.R. (1989). International Professional Communication Conference. Communicating to the World, p. 39-41
EXPERIENCE as a TECHNICAL WRITER
âI began teaching technical writing in 1981 at Texas Tech University, having spent the six preceding years working as a technical writer in a research center in developmental disabilities. As a technical writer, I wrote proposals and instructional materialsâ
Keywords: Developmental disabilities, instructional methods
Nelkin, D. (1990). Selling science. Physics Today. Vol.43 (11), p. 41.
âFor most people the reality of science is what they read in the press. They understand science less through direct experience or past education than through the filter of journalistic language and imageryâ
Keywords: reality of science, filter, language and imagery
USES OF TECHNICAL WRITING
Williams Dudley, J. (Spring, 1977). Griffin in the English department: the uses of technical writing. English Education, 8(3), 174-181.
âI believe that exercises in mechanism and process description, establish standards and specifications, and making multiple evaluations will sharpen the rhetorical skills which a composition course is, by tradition, supposed to inculcateâ
Keywords: Mechanism, specifications, rhetorical skills, inculcate
TO: Professor Ellis
FROM: Win Naing
DATE: April 25, 2017
SUBJECT: Project 2, Research Logbook update
(this is an update for April 6th research)
The following are 9 references for my research-based project 2: Infographics.
1) âGraphic Design is a visual communication. Visual communication combines speech, written language, and imagery into messages that are aesthetically pleasing, connect with the audience on intellectual and emotional levels,and provide them with pertinent information. When properly executed, graphic design identifies, informs, instructs, interprets, and even persuades viewers to do something.â (p. 14)
âWhen executed poorly, design can create mass confusion. The infamous âbutterfly ballotâ designed by the Florida Electronics office (instead of a graphic designer) may have inadvertently led people to vote for the wrong candidate.â (p. 15)
Hembree, R. (2006). The complete graphic designer. Massachusett, MA: Rockport Publishers.
Keywords: visual communication, aesthetic, intellectual, inform, interpret
2) âThe origins of infographics: The foundation of information graphics is analytic geometry, a bunch of geometry developed and first used in 1637 by the French philosopher, mathematician, and scientist RenĂ© Descartes (1596-1650). Descartes used algebra to solve geometry problems, formulate equations to represent lines and curves and represent a point in space by a pair of numbers.â
âCartesian coordinates and other aspects of analytic geometry were later used by the Scott author and scientist William Playfair (1759-1823) to convert statistical data into symbolic graphics.â (p. 125)
Meggs, P.B., and Purvis, A.W., (2006). Meggsâ History of Graphic Design. New Jersey, NJ: John Wiley & Sons, Inc.,
Keywords: statistic, data, symbolic, graphics, geometry
3) âThis Rosetta stone, as it would become known, enabled scholars to use their extensive knowledge of Greek to comparatively translate the Egyptian texts, which turned out to be hieroglyphics and Demotic, a cursive form of hieroglyphic script. The Rosetta stone illustrates the power of embedding elements of common understanding in messages to ensure that their meaning can be unlocked by a receiver who may not understand the language of transmission. This principal has broad applications, ranging from the design the development of games and puzzles (eg., crossword puzzles) to devising communications for extraterrestrial intelligences (e.g., plaques designed for the Pioneer 10 and Pioneer 11 space probes.)â(p. 206)
Lidwell, W., Holden, K., and Butler, J. (2003) Rosetta Stone, Universal Principals of Design. Massachusett, MA: Rockport Publishers.
Keywords: Rosetta stone, hieroglyphics, demotic, transmission, extraterrestrial
4.1) âMore and more, everyone from news organizations to advertising agencies relies on infographics to deliver content to audiences. Infographics- as in information graphics– present information graphically, Partner the reporterâs nose for sniffing out a good story with designerâs eye for visualization it, and youâve got infographics.â (p. 154)
âYou might need an infographic if
You need to communicate quickly.
A verbal or written account is too complicated- or tedious-for comprehension.
Your audience canât hear or read well-or at allâ
(p.155)
4.2) Infographic: An infographic delivers information graphically, such as graphs, charts, maps, figures and diagrams. (p. 249)
Golombisky, K. & Hagen, R. (2010). White space is not your enemy. Oxford, UK: Focal Press.
Keywords: visualization, information graphics, infographics, contents, graphically
5) âDiagramming Editorial Content: Contemporary magazine design often breaks up content, dispersing elements across the page and integrating words and images to create engaging, nonlinear experiences for readers. Principles of diagramming and mapping are thus used to organize narrative in a special way. Information graphic typically combine visual and verbal information, requiring mastery of both literate human mind has no difficulty switching between seeing and reading.â(p. 211)
Lupton, E. and Phillips, J.C. (2008). Graphic design the new basics. New York, NY: Princeton Architectural Press.
Keywords: diagramming, mapping, editorial contents, narrative, visual and verbal information
6) âPeople learn and remember more efficiently and effectively through the use of text and visuals than through text alone. Infographics are one way of presenting complex and dense informational content in a way that supports cognitive processing, learning, and future recognition and recollection.â (p. 42)
Dunlap, J. C., & Lowenthal, P. R. (2016). Getting graphic about infographics: design lessons learned from popular infographics. Journal Of Visual Literacy, 35(1), 42-59. doi:10.1080/1051144X.2016.1205832
Keywords: infographics, informational content, cognitive process, future recognition, recollection
7) âThe World Economic Forum needed a report that could capture the complex challenges facing our planet and inspire the worldâs biggest brains to solve them. My role was to work with the art director, Victoria Talbot, on the tip-in data visualizations. We discovered visual solutions to represent the data produced by survey questions such as: âHow great a problem does water pollution pose around the world?â and: âWhich region will be most affected by deepening income inequality in the next 12-18 months?â (p. 84)
Knight, E. L, Graphic Designer. (February, 2015). Convert complex data into clear infographics. Computer Arts. 236, 83-85.
Keywords: data visualization, art director
8) First Bar Chart and Time Series
âThe Scottish engineer William Playfair has been credited with inventing the line, bar, and pie charts. His time-series plots are still presented as models of clarity. Playfair first published The Commercial and Political Atlas in London in 1786. It contained 43 time-series plots and one bar chart. It has been described as the first major work to contain statistical graphs. Playfairâs Statistical Breviary, published in London in 1801, contains what is generally credited as the first pie chart.â (p. 3)
âCholera Map
In 1854, the physician John Snow mapped the incidence of cholera cases in London to determine the linkage to contaminated water from a single pump, as shown in Figure 1-3. Prior to that analysis, no one knew what caused cholera. This is believed to be the first time that a map was used to analyze how disease is spread.â (p. 4)
Dunlop, N. (2013). Beginning Big Data with Power BI and Excel 2013. New York, NY :Apress
9) âFlorence Nightingale produced the original Diagram of the Causes of Mortality in the Army in the East in late 1858. It showed that most of the British soldiers who died during the Crimean War died of sickness (blue) rather than of wounds or other causes (red or black). It also showed that the death rate was higher in the first year of the war (right half of diagram), before improvements in the treatment of soldiers reduced sickness. She used this diagram to show that we can control epidemic disease – something that was not obvious in her day.â
Retrieved from http://www.florence-nightingale-avenging-angel.co.uk/Coxcomb.htm
TO: Professor Ellis
FROM: Steven Mathieu
DATE: 04/28/2017
SUBJECT: Research Logbook Update
1)
A Data Science Model for Big Data Analytics of Frequent Patterns.
By: Carson K. Leung ; Fan Jiang ; Hao Zhang ; Adam G.M. Pazdor. 2016, p 866-873.
âFrequent pattern mining is an important data mining task. Since its introduction, it has drawn attention from many researchers. Consequently, many frequent pattern mining algorithms have been proposed, which include level-wise Apriori-based algorithms, tree-based algorithms, and hyperlinked array structure based algorithms.â
(Leung, Jiang, Zhang, Pazdor, 2016, p. 866).
Keywords: Data Mining, Algorithms, Big Data Analytics.
Carson K. Leung ; Fan Jiang ; Hao Zhang ; Adam G.M. Pazdor (2016). A Data Science Model for Big Data Analytics of Frequent Patterns. 11(4), 866-873. Doi:10.1109/DASC-PICom-DataCom-CyberSciTec.2016.148
http://ieeexplore.ieee.org.citytech.ezproxy.cuny.edu:2048/document/7588946/
2)
Big data and the regulation of financial markets.
By: Sharyn O’Halloran ; Sameer Maskey ; Geraldine McAllister ; David K. Park ; Kaiping Chen. 02/11/2016, p11.
âThe development of computational data science techniques in natural language processing (NLP) and machine learning (ML) algorithms to analyze large and complex textual information opens new avenues to study intricate processes, such as government regulation of financial markets, at a scale unimaginable even a few years ago. â
(Halloran, Maskey, McAllister, Park,Chen, 2016).
Keywords: Computational Analysis, Financial, Natural Language Processing.
(Halloran, Maskey, McAllister, Park,Chen, 2016). Big data and the regulation of financial markets.
http://ieeexplore.ieee.org.citytech.ezproxy.cuny.edu:2048/document/7403687/
3)
A Survey of Game Theoretic Methods for Cyber Security.
By: Yuan Wang ; Yongjun Wang ; Jing Liu ; Zhijian Huang ; Peidai Xie. Jan 2017.
âCyber security has been heavily studied in both industry and academia, but the traditional security technology is still facing unprecedented challenges in the background of massive and complicated network traffic. Game theory as a mathematical model of conflict and cooperation between intelligent rational decision-makers has great potential to improve cyber security.â
(Jan, 2017)
Keywords: Cyber Security, Network traffic, Game theory
Wang, Liu, Huang, Xie. (2017). A Survey of Game Theoretic Methods for Cyber Security.03.02.2017.
http://ieeexplore.ieee.org.citytech.ezproxy.cuny.edu:2048/document/7866199/
4)
Quality assurance for data science: Making data science more scientific through engaging scientific method. By: Narada Wickramage, Tho. EURASIP Journal on Wireless Communications & Networking. 9/27/2015, Vol. 2015 Issue 1, p1-14. 14p
âCredibility of science is fundamentally due to the strenuous efforts made to verify the general consistency among relevant facts, theories, applications, research methodologies, etc. and scientific method which emphasizes the significance of continuously building and testing hypotheses has withstood the test of time as a successful methodology of acquiring a body of knowledge, we can rely on, at least within a certain context. â
Keywords: Cyber security, Network traffic, Game theory
http://ieeexplore.ieee.org.citytech.ezproxy.cuny.edu:2048/document/7821627/
6)
Data science for software engineering.
Microwaves & RF. Dec2016, Vol. 55 Issue 12, p21-21. 1p. 1
âSoftware practitioners and researchers wanting to understand the state of the art in using data science for software engineering (SE). Content: In the age of big data, data science (the knowledge of deriving meaningful outcomes from data) is an essential skill that should be equipped by software engineers. It can be used to predict useful information on new projects based on completed projects.â
(Anonymous, 2016, p. 1)
QUALCOMM TEASES A Prototype Spectrum-Sharing Radio. (2016). Microwaves & RF, 55(12), 21.
http://ieeexplore.ieee.org.citytech.ezproxy.cuny.edu:2048/document/6606752/
7)
Effectiveness of semi-supervised learning in bankruptcy prediction.
By: Stamatis Karlos ; Sotiris Kotsiantis ; Nikos Fazakis ; Kyrgiakos Sgarbas. eWeek. 12/19/2016.
âAdoption of techniques from fields related with Data Science, such as Machine Learning, Data Mining and Predictive Analysis, in the task of bankruptcy prediction can produce useful knowledge for both the policy makers and the organizations that are already funding or are interested in acting towards this direction in the near future.â
(Karlos, Kotsiants, Fazakis, Sqarbas, 2016)
Karlos, Kotsiants, Fazakis, Sqarbas, 2016.Effectiveness of semi-supervised learning in bankruptcy prediction. eWeek. 12/19/2016.
https://static.aminer.org/pdf/PDF/000/302/689/effectiveness_of_information_extraction_multi_relational_and_semi_supervised_learning.pdf
8)
Study on dynamic model and demonstration analysis for urban housing purchasing power measuring.
By: Ai-hua Li ; Yong Shi. 11/7/2008
âHousing purchasing power measuring is an important issue for the housing guarantee decision making, which has been studied in the static way. However, the consumption structure and income are not changeless. Thus the dynamic model for urban housing purchasing power is proposed and the main idea is as follows. â
(Li, Shi, 2017 p. 1)
Keywords: Dynamic Model, Power, Measuring
Aihua Li, Jun Liu, “Computation and Comparative Study of PIR and HAI with Demonstration Analysis in Beijing”, Computational Sciences and Optimization 2009. CSO 2009. International Joint Conference on, vol. 1, pp. 1012-1015, 2009.
http://ieeexplore.ieee.org.citytech.ezproxy.cuny.edu:2048/document/4669150/