Project 2, Research Logbook Update

Before the end of class, copy-and-paste your research logbook into a comment made to this blog post. Books that you might find useful also have to be entered into your logbook along with any quotes that you type up from the book resource. Remember to reformat your bibliographic data as an APA Reference entry, and include a parenthetical citation for all material quoted from a text.

We will continue your research during Thursday’s class as well. If you need to visit the library during class, you may do so only after talking with Professor Ellis at the beginning of class.

21 thoughts on “Project 2, Research Logbook Update

  1. Jose A. Jimenez

    TO: Professor Ellis
    FROM: Jose A. Jimenez
    DATE: 04/06/2017
    SUBJECT: Research Logbook Update

    Energy efficiency analysis of cache-enabled cooperative dense small cell networks.

    By: Jinbo Liu; Shaohui Sun. IET Communications. 2017, Vol. 11 Issue 4, p477-482. 6p

    “Small cell technologies deployed densely will become increasingly
    important in terms of providing more uniform and higher data rates
    for mobile users in the future 5th generation (5G) networks due to
    its smaller cell size and lower transmit power, which can reduce the
    network congestion”

    (js et al., 2017, p. 477).
    Keywords: 5th generation, higher data rates, lower transmit power.

    Jinbo, L., & Shaohui, S. (2017). Energy efficiency analysis of cache-enabled cooperative dense small cell networks. IET Communications, 11(4), 477-482. doi:10.1049/iet-com.2016.0680

    10 Reasons to Get Excited About the Advent of 5G Wireless.

    By: Reisinger, Don. eWeek. 02/27/2017, p1-1. 1p.

    “Speed is arguably one of the more important 5G features. According to the Next Generation Mobile Networks Alliance, which defines the technology’s requirements, 5G should be capable at a minimum of delivering speeds of 100Mbps in metropolitan areas and “tens of megabits per second” in smaller areas. Carrier tests have already achieved 1Gbps and faster.”

    (Reisinger, 2017, pa 1).

    Keywords: Speed, 5G, Tens of megabits per second.

    Reisinger, D. (2017). 10 Reasons to Get Excited About the Advent of 5G Wireless. Eweek, 1.

    Virtual MAC concept and its protocol design in virtualised heterogeneous wireless network.

    By: Bo Fan; Hui Tian; Yuexia Zhang; Yuan Zhang. IET Communications. 2017, Vol. 11 Issue 1, p53-60

    Hence, mobile network operators (MNOs) have to increase network investments, including licensed spectrum, cell sites and backhaul infrastructure to improve network capacity and fulfil users’ needs. Besides, with 5G era coming, the coexistence of multiple radio access technologies (RATs) requires an efficient methodology to coordinate these networks.

    (bhyy et al., p. 54).

    Keywords: licensed spectrum, radio access technologies (RATs), mobile network operators (MNOs)

    Bo, F., Hui, T., Yuexia, Z., & Yuan, Z. (2017). Virtual MAC concept and its protocol design in virtualised heterogeneous wireless network. IET Communications, 11(1), 53-60. doi:10.1049/iet-com.2016.0293


    Major Wireless Developments.

    By: FRENZEL, LOU. Electronic Design. Jan 2017, Vol. 65 Issue 1, p12-16

    “The Fifth-Generation cellular system is a work in progress; the Third-Generation Partnership Project (3GPP) is grinding away at the standards details. A final standard is scheduled for the 2019-2020 timeframe, although one carrier (AT&T) is pushing for earlier standard definition in 2017. That may not happen, but it shows the need and interest for faster systems with increased user capacity.”

    (Frenzel, 2017, p. 1)

    Keywords: cellular system, project (3GPP), faster systems

    FRENZEL, L. (2017). Major Wireless Developments. Electronic Design, 65(1), 12-16.

    Enabling 5G mobile wireless technologies.

    By: Le, Long; Lau, Vincent; Jorswieck, Eduard; Dao, Ngoc-Dung; Haghighat, Afshin; Kim, Dong; Le-Ngoc, Tho. EURASIP Journal on Wireless Communications & Networking. 9/27/2015, Vol. 2015 Issue 1, p1-14. 14p

    “It is predicted that the 5G wireless system should be able to deliver as much as 1000 times of the capacity pro-vided by today’s mobile networks.”

    (lvenadt et al., p. 1)

    Le, L., Lau, V., Jorswieck, E., Dao, N., Haghighat, A., Kim, D., & Le-Ngoc, T. (2015, September 27). Enabling 5G mobile wireless technologies. EURASIP Journal on Wireless Communications & Networking. pp. 1-14.


    QUALCOMM TEASES A Prototype Spectrum-Sharing Radio.

    Microwaves & RF. Dec2016, Vol. 55 Issue 12, p21-21. 1p. 1

    “The 5G New Radio, as the prototype is called, searches up and down the wireless spectrum for potential openings. The radio can broadcast on frequency bands below 6 GHz, where most of today’s devices send communications, and then leap into higher bands in the millimeter-wave range.”

    (Anonymous, 2016, p. 1)

    QUALCOMM TEASES A Prototype Spectrum-Sharing Radio. (2016). Microwaves & RF, 55(12), 21.


    Real 5G Years Away Even as Wireless Industry Prepares for Its Arrival.

    By: Burt, Jeffrey. eWeek. 10/3/2016, p1-1. 1p.

    “It’s called 5G, essentially the next generation of wireless connectivity after 4G LTE, and it holds the promise of more speed and capacity and lower latency to unlock the potential of everything from gaming, streaming video and virtual reality (VR) to the internet of things (IoT), smart cities, machine-to-machine (M2M) communications and autonomous cars.”

    (Burt, 2016, p. 1)

    Burt, J. (2016). Real 5G Years Away Even as Wireless Industry Prepares for Its Arrival. Eweek, 1.


    Performance of emerging multi-carrier waveforms for 5G asynchronous communications.

    By: Van Eeckhaute, Mathieu; Bourdoux, André; De Doncker, Philippe; Horlin, François. EURASIP Journal on Wireless Communications & Networking. 2/7/2017, Vol. 2017 Issue 1, p1-15

    “In the near future, it is expected that the mobile internet will massively be used for machine-
    to-machine communications, introducing the concept of Internet-of-Things (IoT).”

    (vmaph et al., 2017 p. 1)

    Van Eeckhaute, M., Bourdoux, A., De Doncker, P., & Horlin, F. (2017). Performance of emerging multi-carrier waveforms for 5G asynchronous communications. EURASIP Journal On Wireless Communications & Networking, 2017(1), 1-15.

  2. Shirley

    Below are 7 out 8 Library sources for my research-based project 2 of Healthcare Regulation U.S

    Walshe, K., & Shortell, S. M. Social regulation of healthcare organizations in the United States: developing a framework for evaluation. Health Services Management Research. May 2004, 17 (2), p79-99.

    “Social regulation is ubiquitous in the US healthcare system, and American healthcare organizations claim to be among the most regulated institutions in the world. Yet relatively little is known about the impact of social regulation on these organizations’ performance, or about the characteristics or determinants of effective regulatory strategies and approaches”(Walshe, K., & Shortell, S. M. 2004, p.79).

    Moffat, Jeffrey C. (2016). EMTALA and managed care. In Department of Health and Human Services (Eds.), EMTALA Answer Book (p.1-26). New York: Aspen Publishers Inc.

    “Hospitals is obligated to comply with the requirements if an individual seeking care is a member of a managed health care plan, and mentions that the U.S. Department of Health and Human Services issues the rules regarding the services” (Moffat, J. C. 2016 p.10).

    Moran, Patricia A. 2015. Health Care Compliance: A Checklist for Employers. Managing Benefits Plans,17 (3), p11-16.

    “The Affordable Care Act’s ‘‘employer shared responsibility’’ mandate, employers
    of a certain size must either offer coverage to full-time employees, or risk paying a penalty” (Moran, Patricia A. 2015, p.11).

    Modern Healthcare. 2016, January 4. 2016 will bring flurry of new rules and regulations affecting health care. Modern Healthcare, 46, p12-12.

    “Health plans will face penalties for publishing inaccurate provider directories: Medicare Advantage plans will have to pay $25,000 per day per member, while federal exchange plans must pay $100 per day per member” (Modern Healthcare, 2016 p.12).

    Peregrine, M.W., & Schwartz, J.R. March 2002 Must-know legal issues for healthcare CFOS. Healthcare Financial Management, 56 (3), p50-57.

    “Regulatory agencies, such as the Securities and Exchange Commission, are scrutinizing not-for profit and charitable attention to existing regulations, healthcare financial managers need to increase their diligence in ensuring their organization’s’ compliance with those laws governing areas for which they traditionally have been accountable, including auditor relationships, restricted gifts, consulting arrangement, investment management, and financial reporting”(Peregrine, M.W., & Schwartz, J.R. 2002 p.51).
    Rubenfire, A. 2017. Trump wants to thin federal regulations, and the healthcare industry would love to help. Healthcare,47 (6) p. 20

    “Healthcare is one of the most regulated industries in the U.S. economy, so President Donald Trump made a lot of healthcare leaders happy with his executive order calling for the federal government to kill two regulations with each new one it rolls out. Fulfilling that promise will be complicated, if not totally unworkable—the order raises important questions that might not be answered until it’s enforced in practice. It will be up to the Office of Management and Budget to standardize how regulatory costs are measured and clarify what qualifies as new and offsetting regulations—the agency already issued interim guidance for regulators on Friday that answers certain questions” (Rubenfire, A. 2017 p.20).

    Avraham, R. 2011. Private Regulations. Harvard Journal of Law & Public Policy, 34 (2), p.543-638

    “Improving the quality of information channeled to doctors can further what legislators agree are healthcare reform’s three main goals: increasing access for the uninsured, controlling rising costs, and improving patient safety by improving the quality of care” (Avraham, R. 2011 p.546).

    1. Steven Rivera

      Unger, R., Chandler, C. (2009). A project guide to UX design: For user experience designers in the field or in the making. Berkeley, CA : New Riders.

      Keinonen, T. (2010). Protect and appreciate- notes on the justification of user-centered design. International Journal Of Design, 4(1), 17-27.

      “The design community’s lack of attention and commitment to genuine human and ecological needs has been repeatedly recognised and criticized” (Keinonen, 2010 p.17).

      Marti, P., Bannon, L. J. (2009). Exploring user-centred design in practice: some caveats. Knowledge, Technology & Policy, 22(1), 7-15.

      “While a user-centred perspective is required at all times in the design team, the forms of participation of users in the design process needs to fit the context and can vary significantly from that presented as the prototypical UCD approach” (Marti & Bannon, 2009 p. 7).

      Dirin, A., Nieminen, M. (2015). mLUX: usability and user experience development framework for m-learning. International Journal Of Interactive Mobile Technologies, 9(3), 37-51.

      “User requirements are the focus of all stages of development cycle” (Dirin & Nieminen, 2015 p. 38).

      Marcos, M. m. (2010). Interview with lou rosenfeld. El Profesional De La Información, 19(4), 435-437.

      “Identify your users’ most common information needs, and see how well your site succeeds in enabling users to satisfy those needs” (Marcos, 2010, p. 436).

      Fichter, D., Wisniewski, J. (2016). Emotional design, storytelling, ‘slippiness,’ and understandable icons. Online Searcher, 40(1), 74-76.

      “People will remember how they feel long after they remem ber the particular de­
      tails of what they were doing” (Fichter & Wisniewski, 2016, p. 74).

      Adisen-North, A. (2007). Designing for usability. New Media Age, 10-11.

      “However, good usability isn’t just about user testing products just before they go live. Ifs a more established process of keeping users at the centre of product development, from the project initiation stage through to delivery and beyond” (Adisen-North, 2007, p. 10).

      Putnam, C., Rose, E., Johnson, E. J., & Kolko, B. (2009). Adapting user-centered design methods to design for diverse populations. Information Technologies & International Development, 5(4), 51-73.

      “UCD is a design philosophy that emphasizes the importance of considering the end user’s needs, goals, and desires when creating products or services” (Putnam, Rose, Johnson, & Kolko, 2009, p. 51).

      Andrews, C., Burleson, D., Dunks, K., Elmore, K., Lambert, C.S., Oppegaard, B., … Zobel, G. (2012). A new method in user-centered design: collaborative prototype design process (CPDP). Journal of Technical Writing & Communication, Vol. 42 (Issue 2), p123-142. 20p.

      “The CPDP is an innovative approach to user-centered website design that emphasizes collaboration, iterative testing, and data-driven design” (Andrews et al, 2012, p. 123).

  3. Anelsy R

    TO: Professor ellis
    FROM: Anelsy Rodriguez
    DATE: 04/06/2017
    SUBJECT:Research Logbook-Update

    Here you can find some of my Logbook Updated (library sources) that I will use for project 2.

    Masson, V., et Al. (2014, June 4)”Solar Panels Reduce Both Global Warming and Urban Heat Island.” Frontiers. from

    “Sims et al. (2003) show that most renewable energies can, in certain circumstances, reduce cost as well as CO2 emissions, except for solar power, which remains expensive” (Bonhomme, June 4, 2014, Pa.2 ).

    Anonymous. (2011, Sept. ) “Solar panels.” The Science Teacher, p. 24. Academic OneFile From|A267811167&v=2.1&u=cuny_nytc&it=r&p=AONE&sw=w

    “In a study in the journal Solar Energy, Kleissl and his team published what they believe are the first peer-reviewed measurements of the cooling benefits provided by solar photovoltaic panels. Using thermal imaging, researchers determined that during “ (Anonymous, Sept. 2011, p. 24.).

    Vertat, Ivo, and Ales Vobornik. (2014 ). “Efficient and reliable solar panels for small CubeSat picosatellites.” International Journal of Photoenergy. From|A424006833&v=2.1&u=cuny_nytc&it=r&p=AONE&sw=w

    “Solar panels are faced to rain, snow, freeze, hailstone, overheating, sandstorm, and many other effects. In [5, 6] the wind-induced pressures on inland solar panels are evaluated. In space usage the solar panels are not faced with the unstable meteorological conditions, but solar panel area and solar cell efficiency are critical due to satellite (or picosatellite) mass limit” (Vertat, et Al., 2014, pa 4).

    Debije, Michael. (2015) “Better luminescent solar panels in prospect.” Nature, vol. 519, no. 7543, p. 298+. Nursing and Allied Health Collection From:

    “Devices known as luminescent solar concentrators could find use as renewable-energy generators, but have so far been plagued by a major light-reabsorption effect. A new study offers a promising route to tackling this problem” (Debije, 2015, p. 298).

    Goddard, Leah. (2015)”The solar panel manufacturing industry’s boom, bust, and future.” Business Economics, vol. 50, no. 3, p. 147. From:

    “Nevertheless, despite strong growth in solar panel installation worldwide and the initial dramatic growth in domestic solar panel manufacturing, U.S. solar panel producers have struggled to stay competitive in the global marketplace in recent years” (Goddard, 2015, p. 147).

    Paterniani, J. (2012). “Greenhouse tomato production with electricity generation by roof-mounted flexible solar panels.” Seielo. vol.69 no.4 From:

    “The integration of renewable energy sources into greenhouse crop production in southeastern Spain could provide extra income for growers” (Paterniani, 2012).

    Last, J. Ed. (2007). Green Energy. A Dictionary of Public Health. Retrived from:

    “Energy that is generated without polluting the environment by adding to the burden of atmospheric greenhouse gases or causing other environmental harm, such as loss of human and wildlife habitat by construction of large hydroelectric dams. Available varieties of green energy include solar and wind power, tidal power, and geothermal energy sources” (Last, 2007).

    Last, J. Ed. (2007). Energy. A Dictionary of Public Health. Retrived from:

    “The force generated by combustion, e.g., of calories during metabolism, or carbon-based fuels in a furnace or power plant, and by radioactive nuclear transformation. Several sources and types of energy include kinetic, thermal, nuclear, etc ” (Last, 2007).

    Last, J. Ed. (2007). Renewable Sources. A Dictionary of Public Health. Retrieved from:

    “Resources derived from natural systems that are not finite, such as solar, tidal, and wind energy, or from living organisms, such as trees that can be replaced by others as they are used. The term is used mainly in referring to energy resources; renewable energy resources are those derived from sun, wind, tides, or vegetable or animal sources. These include biomass fuels, ethanol (alcohol derived from fermentation, e.g., of corn), methane generated by fermentation of manure or human waste, and, technically, power generation using solar, wind, and tidal energy. See also green energy” (Last, 2007).

    Last, J. Ed. (2007). hydroelectric power generation. A Dictionary of Public Health. Retrieved from:

    “A form of renewable energy production, considered “clean” because it does not produce harmful emissions, as do carbon-based fuels. Hydroelectric dams may drown fertile river valleys that were previously the habitat for large populations that have been displaced to environments less capable of sustaining them, although they also provide water storage for irrigation of previously parched land. In tropical and subtropical regions, dams and irrigation schemes may extend the range and habitat for disease vectors, including mosquitoes and snails. The positive and negative side effects of hydroelectric dams are more often considered in long-range planning now than they were in the early 20th century” (Last, 2007).

    Evans, Kim Masters. (2015). “Renewable Energy.” Energy: Supplies, Sustainability, and Costs, ed., Gale, pp. 89-103. from:

    “Several international organizations are devoted to promoting the use of renewable energy sources” (Evans, 2015, pp. 89-103).

    Evans, Kim Masters. (2013) “Renewable Energy.” Energy: Supplies, Sustainability, and Costs, 2013 ed., Gale, pp. 85-99. from:

    “Like fossil fuels, renewable energy sources are produced naturally, but unlike fossil fuels, renewable energy sources do not take millennia to form. Some are available immediately and regenerate constantly. Examples include wind, sunlight, tides, and the heat stored beneath the earth’s crust” (Evans, 2013, pp. 85-99).

    Keywords: Energy, renewable sources, power, photovoltaic panels, solar cell, generator, installation, green energy.

  4. Maoya

    TO: Professor Ellis
    FROM: Kazi Maoya
    DATE: 4/6/2017
    SUBJECT: Research logbook update

    The future of cloud computing.
    Full Text Available
    By: Ferguson, Scott. eWeek. 10/20/2008, Vol. 25 Issue 30, p17-17. 1p.

    “When it comes to building out cloud computing infrastructures in the next two years, two of the world’s most formidable IT companies Google and Microsoft—are preparing to pour money and resources into developing significantly different models of how this type of
    computing should look.”

    (Ferguson,Scott, October 20,2008 p.17)


    Cloud computing in e-Science: research challenges and opportunities.
    Full Text Available
    Academic Journal
    By: Yang, Xiaoyu; Wallom, David; Waddington, Simon; Wang, Jianwu; Shaon, Arif; Matthews, Brian; Wilson, Michael; Guo, Yike; Guo, Li; Blower, Jon; Vasilakos, Athanasios; Liu, Kecheng; Kershaw, Philip. Journal of Supercomputing. Oct2014, Vol. 70 Issue 1, p408-464. 57p. DOI: 10.1007/s11227-014-1251-5.

    “Next-generation scientific research has radically changed the way in which science is
    carried out [1,2]. With the assistance of modern e-Infrastructure that integrates high performance computing, large-capacity data storage facilities and high-speed network
    infrastructure, the exploration of previously unknown problems can now be solved by
    simulation, generation and analysis of large amounts of data, sharing of geographically
    distributed resources (e.g. computing facilities, data, scripts, experimental plans,
    workflows) and global research collaboration.”

    (Yang,Xiaoyu, Journal of Supercomputing, October 2014 p409)

    Key word: radically,integrates,simulation,collaboration.

    Full Text Available
    Academic Journal
    By: Surendro, Kridanto; Supriana, Aradea; Supriana, Iping. Journal of Information & Communication Technology, Dec2016, Vol. 15 Issue 2, p1-17, 17p

    “Each organization will require different computational resources. This is influenced by the business view of the organization which has particular characteristics different from the characteristics of other organizations,even when they belong to the same type of organization. Thus, the role of understanding the organization’s environment should be well defined; a
    holistic understanding which covers the real/actual needs of organizations.If this aspect is not considered, computational resources will not support the organizations; rather, they have a short lifetime and become a burden for the organizations.”

    (Surendro,Kridanto,Journal of Information & Communication, December 2016, p2)


    Impact of Security Issues in Cloud Computing Towards Businesses.
    Full Text Available
    Academic Journal
    By: Methqal AlFawwaz, Bader. World of Computer Science & Information Technology Journal, 2017, Vol. 7 Issue 1, p1-6, 6p

    “The different types of attacks in cloud computing have varying levels of impact on the operations of a business and the potential to interrupt the same. Hence, different levels of attention and consideration is afforded the attacks existing in an identified context. Essentially, the main concern with respect to the use of cloud computing in business is the loss of compromise of data. Whereas each of the different attacks leads to the loss or compromise of client information, the prevention of each remains a contextualized approach. Denial of service attacks is arguably among the leading security threats in corporate engagements. Such attacks cast a strain on the dedicated cloud computing resources of an organization and thus leading to additional costs. Ideally, cloud computing operates through dedication of storage space and computing bandwidth to connected users. Where such resources are under attack in the course of denial of service, the effectiveness of the network to the particular users remains hampered. [11] notes that Denial of Service Attacks lead to additional costs in the maintenance of the cloud-computing network associated with a particular organization. The figure below gives an illustration of the execution procedure of a Denial of Service Attack.”
    (Methqal AlFawaz,World of Computer Science & Information Technology, 2017,p3)


    On the Clouds: A New Way of Computing.
    Full Text Available
    Academic Journal
    By: Yan Han. Information Technology & Libraries, Jun2010, Vol. 29 Issue 2, p87-92, 6p, 1 Black and White Photograph, 1 Diagram

    “Scholarly communication and new ways of teaching provide an opportunity for academic
    institutions to collaborate on providing access to scholarly materials and research data. There is a growing need to handle large amounts of data using computer algorithms that presents challenges to libraries with limited experience in handling non textual materials. Because of
    the current economic crisis, academic institutions need to find ways to acquire and manage computing resources in a cost-effective manner.”

    (Yan Han, Information Technology & Libraries,Jun 2010,p87)

    Key word:Scholarly,collaborate,textual,cost-effective.

    An Analysis of the Benefits of Cloud Services for Supply Chain Using Analytic Hierarchy Process.
    Full Text Available
    Academic Journal
    By: Gowda, Anil B.; Subramanya, K. N.. IUP Journal of Computer Sciences, Oct2015, Vol. 9 Issue 4, p31-45, 15p

    “There are many factors that influence the decision making in a supply chain, leading
    to the successful operation of various activities in a supply chain. Hence, it is important
    that the information is available instantaneously for making a quick decision. Quick
    decisions help in fulfilling customer demands quickly. With the existing vendors
    catering to the regular supplies, new partners offering value-added services need to be
    integrated. This also causes a change in the business relationship from long-term
    contracts to short-term contracts. This leads to an event-driven management for dynamically creating and delivering individualized products and services. Developments
    in the business world and information technology have enabled decision makers to
    have a sharper focus on various issues. Globalization of the supply chain activities in
    many companies has led to adoption of information technology. Over the years, various
    information technologies have been developed, and today, the world looks at cloud
    computing techniques as one of the major development in IT that can facilitate quick
    decision making. Today, various Information Technology solutions are available for
    managing the supply chain services, and hence there is a need to evaluate the services
    in terms of their importance. Cloud service offers various customization facilities at
    lower price and hence is a potential technique to manage the Supply Chain Network
    (SCN). A cloud service integrated into the supply chain network offering various supply
    chain solutions is referred to as Cloud Supply Chain as a Service (CSCaaS) and the entire
    network of supply chain is referred to as Cloud Supply Chain Network (CSCN).”

    (Gowda, Anil B, Journal of Computer Science, October 2015,p32)

    Key word:Instantaneously,integrated,evaluate.

    A Survey on Data Security and Integrity in Cloud Computing.
    Full Text Available
    Academic Journal
    By: Ambika, N.; Sujaritha, M.. International Journal of Advanced Research in Computer Science, Jul/Aug2016, Vol. 7 Issue 4, p57-63, 7p

    “The problem of access control on outsourced data to `honest but curious’ cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data les, were re-encryption and retransmission by the data owner may not be acceptable.Considering the user privacy and data security in cloud environment, in this chapter, a solution is proposed to achieve flexible and fine-grained access control on outsourced data les. In particular, the problem of defining and assigning keys to users is concerned. The access policies and users’ information are hidden to the third-party cloud servers. The proposed scheme is partially based on the observation that, in practical application scenarios each user
    can be associated with a set of attributes which are meaningful in the access policy and data le context. The access policy can thus be defined as a logical expression formula over different attribute sets to reflect the scope of data les that the kind of users is allowed to access. As any
    access policy can be represented using a logical expression formula, fine-grained access control can be accomplished.”

    (Ambika,International Journal of Advanced Research in Computer Science, Jul/Aug 2016, p62)


    Benefits and Challenges of Mobile Cloud Computing.
    Full Text Available
    Academic Journal
    By: Guha, Radha. International Journal of Simulation — Systems, Science & Technology, 2013, Vol. 14 Issue 4, p15-20, 6p

    “The number of mobile devices, end-users and mobile applications has catapulted in the current decade. Many more people have smartphones with wireless connections to the internet even if they do not have a personal computer. The smartphone market is driven by the mobile applications like iPhone apps, Google apps etc. Driven by the mobile apps, smartphones are becoming popular and according to ABI Research [10] by the end of 2013 there will be 1.4 billion smartphone users in the world and increasingly more number of people will switch to smartphones in near future. These smartphones include advanced application programming interface (API) to include third party applications. Recent data shows [11] voice traffic is only 2% of the total wireless traffic in North America and the rest 98% is for mobile application data. Thus smart-phones and tablets are increasing data activity many fold in the wireless bandwidth than the older generation of mobile phones.”

    (Guha,Radha.International Journal of Simulation-Systems, Science & Technology,2013, p16)

    Key word:catapulted, interface.

  5. Adrian Valarezzo

    TO: Professor Ellis
    FROM: Adrian Valarezo
    DATE: 4/6/17
    SUBJECT: Project 2 Articles

    1.Private Property and Property Rights. (2008). In Everyday Finance: Economics, Personal Money Management, and Entrepreneurship (Vol. 1, pp. 241-244). Detroit: Gale. Retrieved from

    “One of the earliest thinkers to deal with the notion that we now call private property was the ancient Greek philosopher Aristotle. In his work Politics, Aristotle pointed out the tendency of people not to respect or maintain property that was public. Likewise, he noted, when people are required to share equally both the burdens and rewards of property ownership, there is a high likelihood that they will become displeased over disparities in workloads and rewards. While humans came into conflict over many issues, Aristotle observed, they were especially likely to do so over issues arising from common ownership of property.” (2008, p.241)

    2.Copyright (c) 1998 The John Marshall Law School The John Marshall Law Review, Winter, 1998, 31 J. Marshall L. Rev. 299, 1575 words, SYMPOSIUM: THE ROBERT KRATOVIL MEMORIAL SEMINAR IN REAL ESTATE LAW: REINVENTING AMERICA’S MASTER PLANNED COMMUNITIES: FOREWORD, Celeste M. Hammond*

    “By the end of the 1980s there were more than 130,000 residential community associations operating in the United States and more than 30 million Americans subject to their governance. Predictions are that at least fifty million Americans will be living in some form of common interest community by the turn of the century, since nearly one out of every three housing units being built has some form of governing association.” (1998, Rev. 299)

    3. By, J. F. (1997, Sep 09). Trimming role of lawyers in fairfield real estate. New York Times (1923-Current File) Retrieved from

    “It’s like having a baby” said Joy Kony Peshkin, a Wesport lawyer. “Do you need a doctor? No. Anyone can stand there and catch. But you’re damn glad to have one if something goes wrong. (Fritsch, 1997)

    4. Notaro, A. (2001). Journal of American Studies, 35(3), 517-518. Retrieved from
    “Urban Castles, by independent scholar Jared Day, is a history of New York City’s tenements, and it reminds us of the importance of the historical study of law. In rich detail, it explores how tenants and landlords struggled with one another over city housing, and thus we learn whence came now taken-for-granted legal forms such as the security deposit, the standardized lease, and rent control laws. Too often, property rights are analyzed in law schools in terms of economic theories offering little appreciation for the historical, human, and social forces that have shaped legal phenomena. Thus, first-year property professors lecture law students about how the words “rent control” figure in a theoretical melody buzzing with phrases like Pareto optimality, zero transaction costs, and efficient breaches. In contrast with this cool and sleek tune, Urban Castles registers real estate law in the cacophony of rent strikes, socialists and communists, taxpayers’ association’s, judicial activism, and government intervention.” (Notaro. 2001, p. 517)

    5.Wilson, D. (2002). REAL ESTATE LAW. GPSolo, 19(7), 45-46. Retrieved from

    “The first thing you should do to ensure you provide proper representation can be summed up in two words: web research. There is a checklist for due diligence, checklist for real estate closing or a step to step guide for evictions…” ( Wilson, 2002, p. 45).

    6. Walston, J., & Lund, J. (2001). Using Legal Assistants in a REAL ESTATE PRACTICE. GPSolo, 18(3), 55-59. Retrieved from

    “The ABA Standing Committee on Legal Assistants in 1991 developed the Model Guidelines for Utilization of Legal Assistants in order to assist lawyers with ethical considerations of
    using assistants. The Model Guidelines provides ten considerations, summarized below:
    1. A lawyer is responsible for all professional actions of assistants. A lawyer must take measures to ensure that the conduct of assistants is consistent with professional rules…” (Walston, 2001, p. 56).

    7. Balbach, S. (1966). Title Insurance and the Lawyer. American Bar Association Journal, 52(1), 65-68. Retrieved from

    “these are the very areas in which action should be taken now to prevent this from happening. The most effective means for so doing seems to be the use of a method where by an attorney offers the protection of his opinion and also insurance against all title defects” (Balbach, 1966, p. 67).

    8. Boyd, B. (2014, January-February). Smart checklists and the future of real estate law practice. Probate & Property, 28(1), 34+. Retrieved from

    “There is also a very practical reason for such explanations to the client: no lawyer wants to work hard taking action that a client has no use for, and no client wants to get a bill for such work. To comply with such ethical duties, and to avoid such misunderstandings, ideally the lawyer should send to the client, as soon as feasible, a checklist confirming the documents and scope of work for such matter.” (Boyd, 2014, p. 34).

  6. Jozef

    Below eight quotes from periodicals or academic journals on my chosen topic – Criminal Justice. Key words are to be found at the end.

    Academic Journal
    By: Katz, Lewis R. Case Western Reserve Law Review. Summer 2016, Vol. 66 Issue 4, p. 923-929

    “It is appropriate that this symposium acknowledges that the Supreme Court Term that began earlier this month marks the twentieth anniversary of the Court’s decision in Whren v. United States.2 My choice of the word “acknowledge” is a neutral term. It is not intended to signify concurrence or celebration. Whren puts the Supreme Court squarely in the middle of the ongoing conflict: Whren fostered the condition that resulted in the current conflicts: racial policing. Nor has it been unusual in our history for the Supreme Court to stand at the forefront of racial injustice” (Katz, 2016, p 924).

    Academic Journal
    By: WASHINGTON, ERIC T. New York University Law Review. Nov 2016, Vol. 91 Issue 5, p. 1087-1103

    “State court chief justices and state court administrators have begun playing pivotal roles in developing policies regarding how best to handle individuals accused of a crime between arrest and the disposition of their cases. This willingness to tackle issues of bail reform is being driven by a new understanding on the part of judges about the actual risks involved in releasing people back into the community pending trial” (Washington, 2016, p 1093).

    Life after stop-and-frisk… really.
    By: CLAXTON, MARQ. New York Amsterdam News. 5/9/2013, Vol. 104 Issue 19, p 13-35

    “Prior to Terry v. Ohio, law enforcement was widely trusted to use common sense, professional discretion and generous legal cause to detain, question and, if necessary, search individuals. Because of questions regarding Fourth Amendment Violations, the courts codified the standards that police must use when stopping and/or searching people. Without a brand-new Supreme Court interpretation, the very sensible and reasonable standard established by the Terry v. Ohio case for stops and searches on the street will remain. The Supreme Court and the U.S. Constitution allow police officers to stop people based on the legal standard of “reasonable suspicion” and utilize a “frisk” search for weapons only” (Claxton, 2013, p 35).

    Academic Journal
    By: JOHNSON, KEVIN R. Denver University Law Review. 2015, Vol. 92 Issue 4, p 701-707

    “The Supreme Court’s decision in Moncrieffe started me thinking in earnest about the relationship between the criminal justice system and immigration removal. In that case, Adrian Moncrieffe, a lawful perma­nent resident, was facing removal from the United States based on a
    criminal conviction for possession of the equivalent of two to three marijuana cigarettes. Addressing a straightforward question of immigration law, the Court found that the U.S. government could not remove Moncrieffe from the country.’ The Court specifically held that, because the crime in question did not constitute an “aggravated felony ,” mandatory removal was not justified” (Johnson, 2015, p 701).

    Court systems rethink the use of financial bail, which some say penalizes the poor.
    By: Laird, Lorelei. ABA Journal. Apr 2016, p 1-1.

    “Stories like Wise’s illustrate why court systems are rethinking the use of financial bail. Concerned about the chain of negative effects bail can have on people of modest means, as well as its contribution to jail overcrowding and costs, jurisdictions around the nation are reforming bail. In 2013, Kentucky was among the earliest to adopt a pretrial system replacing cash bond with risk assessments and pretrial supervision. In 2014, New Jersey voters agreed to a similar system.
    Last summer, New York City announced it was replacing money bond for low-risk defendants with text reminders to appear in court and counseling as appropriate. The state’s chief judge, Jonathan Lippman, announced in October that New York would encourage judges to use alternatives to financial bond. In Texas, Chief Justice Nathan Hecht formed a committee in June to study whether financial bond can be replaced with an evidence-based screening process.
    Even the U.S. Department of Justice has come out strongly against the use of financial bail. Last year, the department intervened in a little-noticed lawsuit challenging bail practices in Clanton, Alabama. “It is the position of the United States that [financial bond, set] without any regard for indigence, not only violates the 14th Amendment’s equal protection clause but also constitutes bad public policy,” the department wrote, intervening in a lawsuit filed by the nonprofit Equal Justice Under Law” (Laird, 2016, p 1).

    SEPARATE, UNEQUAL, AND DEADLY. (cover story).
    By: FREED WESSLER, SETH. Nation. 2/15/2016, Vol. 302 Issue 7, p 12-21

    “When Fagardo-Saucedo arrived at Reeves, a prison complex in rural West Texas, he entered a little-known segment of the federal prison system. Over the previous decade, elected officials and federal agencies had quietly recast the relationship between criminal justice and immigration enforcement. These changes have done as much to bloat the federal prison population as the War on Drugs; they have also helped make Latinos the largest racial or ethnic group sentenced to federal custody” (Freed Wessler, 2016, p 13).

    Academic Journal
    By: Klein, Richard. Touro Law Review. 2013, Vol. 29 Issue 3, preceding p 603-631
    “Whereas it was common knowledge that the vast majority of cases in the criminal courts of this country are resolved by plea bargaining, the Court had never required that court-appointed
    counsel provide competent advice when recommending rejection of a plea offer by the prosecution” (Klein, 2013, p 603).

    California Prison Downsizing and Its Impact on Local Criminal Justice Systems.
    Academic Journal
    By: Petersilia, Joan. Harvard Law & Policy Review. 2014, Vol. 8 Issue 2, p327-357

    “Probation officials were the most optimistic about Realignment and
    hoped that after a reasonable transition time and the institutionalization of
    better rehabilitation programming, counties will be able reduce their jail
    populations without compromising public safety. Doing so will require the
    use of risk assessments, better coordination of decision-making and informa-
    tion-sharing among state and county agencies, and more innovative and cost-
    effective use of alternatives to incarceration. Some counties are succeeding
    with their new responsibilities and funding, and their success can provide a
    blueprint for other counties on how to reduce offender recidivism” (Petersilia, 2014, p 329).

    Key Words: Criminal Justice; Policies, Racial Policing, Racial Injustice, Poverty, Courts, Terry v. Ohio, Bail, Immigration, Plea Bargaining, Prison Downsizing

  7. kangyiliu

    Woulfe, M., Manzke, M.,(2016). A hybrid fixed-function and microprocessor solution for high-throughput broad-phase collision detection. EURASIP Journal on Embedded Systems, 2017(1), 1-15

    “We present a hybrid system spanning a fixed-function microarchitecture and a general-purpose microprocessor,designed to amplify the throughput and decrease the power dissipation of collision detection relative to what can be achieved using CPUs or GPUs alon” (Woulfe, M. Manzke, M.,2016 ,P.1).

    “Collision detection is found in computer games, animation, robotics and computer-aided design (CAD).An improvement in collision detection will benefit myriad applications.”(Woulfe, M. Manzke, M.,2016 ,P.1).

    “Algorithms can be executed on fixed-function microarchitectures on platforms such as application-specific integrated circuits (ASICs)or on general-purpose microprocessors such as CPUs and GPUs. Microarchitectures sacrifice programmability to dissipate less power and exhibit superior throughput. These advantages result from providing the designer with complete control over component layout and from eliminating the overhead of executing instructions”(Woulfe, M. Manzke, M.,2016 ,P.1).

    Microarchitecture, Collision detection, cpu, Gpu, Algorithms

    Danowitz, A., Kelley, K., Mao, J., Stevenson, J. P., Horowitz, M.,(2016). CPU DB: Recording Microprocessor History. ACM Queue, 10(4), 1-15

    “In November 1971, Intel introduced the world’s first single-chip microprocessor, the Intel 4004. It had 2,300 transistors, ran at a clock speed of up to 740 KHz, and delivered 60,000 instructions per second while dissipating 0.5 watts” (Danowitz, A., et al., 2012, p1).

    “Today’s microprocessor chips employ billions of transistors, include multiple processor cores on a single silicon die, run at clock speeds measured in gigahertz, and deliver more than 4 million times the performance of the original 4004” (Danowitz, A., et al., 2012, p1).

    “ This article sheds some light on this question by introducing CPU DB (, an open and extensible database collected by Stanford’s VLSI (very large-scale integration) Research Group over several generations of processors (and students). We gathered information on commercial processors from 17 manufacturers and placed it in CPU DB, which now contains data on 790 processors spanning the past 40 years”(Danowitz, A., et al., 2012, p1).

    “CPU DB allows side-by-side access to performance data for relatively simple in-order processors (up to the mid-1990s) and modern out-of-order processors. One could ask if, at the cost of lower performance, the simplicity of the older designs conferred an efficiency advantage. Unfortunately, direct comparisons using the raw data are difficult because, over the years, manufacturing technologies have improved significantly”(Danowitz, A., et al., 2012, p3)


    Intel 4004, CPU DB, performance data

    Egwaile, J. O., Osayamen, F. O.,(2014). MICROPROCESSOR CONTROLLED CAPACITOR BANK SWITCHING SYSTEM FOR SMART DISTRIBUTION NETWORKS. Nigerian Journal of Technology, 33(3), 318-323

    “the circuit was able to switch on the capacitor bank automatically when voltage on the line drops below the preset value, thus helping to ensure that the voltage on the line stays within the acceptable value”(Egwaile, J. O, et al., 2014, p318). ~the capacitor bank system is keep current above the preset value.

    “This system was implemented by the use of discreet components such as resistors, capacitors, transistor, diode, automatic voltage regulator, with the PIC16F876A microcontroller programmed in micro basic language serving as the main control centre. The microcontroller sends the relevant control signals to the relays to either switch on or switch off the banks when the volage outside allowable limits. When the voltage returns to normal, it also switches off the capactor banks to avoid voltage on the lines” (Egwaile, J. O, et al., 2014, p318).~ microprocessor is the central control circuit in capacitor bank switching system.

    “It would be very useful to utility providers as it will automatically switch “ON” or switch “OFF” the

    banks anytime the voltage on the line goes outside acceptable limits”(Egwaile, J. O, et al., 2014, p322).

    key words:

    Microcontroller, capacitor bank switch system, PIC16F876A microcontroller, basic language

    Urban, R., Vierhaus, H., T., Schölzel, M., Altmann, E., Seelig, H.,(2016). Non-Cyclic Design Space Exploration for ASIPs – Compiler-Centered Microprocessor Design (CoMet). Journal of Circuits, Systems & Computers, 25(3), 1-16

    “the encoding of operations must be specified. In the early phases of the design process many of these details, which are needed to describe the full specification, must not be known, but they are required for

    deriving tools like the compiler and assembler”(Urban, R., et al. 2016, P.2).

    “The compiler translates a C program code into an intermediate code format, which can be simulated and profiled immediately” (Urban, R., et al. 2016, P.3).

    “The sequence of code refinements and optimizations performed by the translation modules will compose a compiler backend. In a final step, CoMet provides an automatic translation of the simulator configuration, which specifies the instruction set architecture (ISA), into a VHDL model”(Urban, R., et al. 2016, P.3).

    “There are many approaches to support an efficient DSE for application specific processors. In most cases, architecture description languages (ADLs) are used to describe the ISA or a structural design3 of the processor. Examples for ADLs which describe ISA are LISA, ISPS and nML. LISA is used for example in the Processor Non-Cyclic DSE for Small ASIPs — Compiler-Centered Microprocessor Design (CoMet) Designer from CoWare (Synopsys). It provides a toolset based on LISA, which supports the designer during the DSE and reduces the effort for tool customization. For example, assembler and instruction set simulator can be generated automatically. A compiler may be generated as well by specifying additional information for code selection”(Urban, R., et al. 2016, P.3-4).

    “The parameters of the architecture are determined by fixed optimization techniques. In that way the compiler is a tool, which can only provide a prede¯ned and strong limited DSE for ASIPs” (Urban, R., et al. 2016, P.4).


    compiler, assembler, C program code, instruction set architecture(ISA), VHDL, DSE, architecture description languages(ADL), LISA, ISPS, nML, ASIPs.

  8. Zeeshan Ahmad

    Title: Practical Professional Books from Elsevier : Practical Electrical Network Automation and Communication Systems (1)
    Contributor: Strauss, Cobus
    Publisher: Newnes
    Date Published: October 2003

    Strauss, C. (2003). Practical Professional Books from Elsevier : Practical Electrical Network Automation and Communication Systems (1). Jordan Hill, GB: Newnes. Retrieved from

    “The term SCADA is the abbreviation for supervisory control and data acquisition. It encompasses the collection of information (data acquisition), transferring the data over physical mediums (the field of telemetry/data communication) and the processing and display of the data at the master station. The master station is also used for centralized control over the communication network and/or to initiate external commands” (Strauss, 2003, p. 108).

    “The term SCADA master is commonly used to refer to the master station, including the hardware and software. SCADA masters were originally only intended to communicate to remote terminal units (RTUs), as the master station and the RTU formed the core of a comprehensive SCADA philosophy. Thereafter, SCADA software was developed to communicate to programmable logic controllers (PLCs) and nowadays SCADA software is available that can communicate to virtually any device capable of advanced communications (Strauss, 2003, p. 108).

    Title: IDC Technology : Practical SCADA for Industry (1)
    Contributors: Bailey, David, Wright, Edwin
    Publisher: Newnes
    Date Published: June 2003

    Bailey, D., & Wright, E. (2003). IDC Technology : Practical SCADA for Industry (1). Jordan Hill, GB: Newnes. Retrieved from

    “SCADA (Supervisory Control and Data Acquisition) has been around as long as there have been control systems. The first ‘SCADA’ systems utilized data acquisition by means of panels of meters, lights and strip chart recorders. The operator manually operating various control knobs exercised supervisory control. These devices were and still are in used to do supervisory control and data acquisition on plants, factories, and power generating facilities” (Bailey & Wright, 2003, p. 1).

    “In the early days of data acquisition, relay logic was used to control production and plant systems. With the advent of CPU and other electronic devices, manufacturers incorporated digital electronics into relay logic equipment. The PLC or programmable logic controller is still one of the most widely used control systems in the industry” (Bailey & Wright, 2003, p. 2).

    Cai, N., Wang, J., & Yu, X. (2008). SCADA system security: Complexity, history and new developments. Industrial Informatics, 2008. INDIN 2008. 6th IEEE International Conference on, 569-574. Retrieved from

    “The old stand-alone SCADA systems were not linked to other systems and computer networks. Their communication mechanisms and protocols are most likely proprietary. For example, Honeywell’s early TDC-3000 DCS has Local Control Network (LCN), which is similar to IEEE 802.4. The second generation of SCADA systems has integrated management systems and control systems within an enterprise or a company. The control system networks were connected to Management Information System (MIS) networks and became a part of the Intranet in an enterprise. The second generation is also called Intranet-based SCADA. Today’s SCADA systems, i.e. Internet-based SCADA or third generation SCADA, which are integrated with Enterprise Resource Planning (ERP) system as shown in Figure 1, have full integration with corporate IT networks which are interconnected with Internet. Operators can remotely monitor and control stations and devices such as RTUs and IEDs over the Internet” (Cai et al., 2008, p. 569).

    “The security of SCADA systems is found to be more complicated than that in the traditional IT or Internet world. The early conventional SCADA designs do not provide industrial systems with the protection against cyber attacks. Old control system facilities are still in use today and they are fully or partially connected to corporate IP networks extending to Internet” (Cai et al., 2008, p. 570).

    Title: Woodhead Publishing Series in Food Science, Technology and Nutrition: Robotics and Automation in the Food Industry: Current and Future Technologies Contributor: Caldwell, Darwin G
    Publisher: Woodhead Publishing
    Date Published: December 2012

    Caldwell, D. G. (Ed.). (2012). Woodhead Publishing Series in Food Science, Technology and Nutrition: Robotics and Automation in the Food Industry: Current and Future Technologies. Cambridge, GB: Woodhead Publishing. Retrieved from

    “The reliability, flexibility, and scalability of SCADA have made it an attractive choice when automating complex systems. SCADA has already been used successfully in a broad range of industries, ranging from energy production to factory automation to agriculture. In each case, the specific application required that various types of hardware be connected and communicate efficiently in order to perform their operation” (Caldwell, 2012, p. 134).

    Keywords: Supervisory Control and Data Acquisition, SCADA master, Remote terminal units, telemetry, control Systems, strip chart recorders, distributed control, field buses, industrial control, programmable logic controllers, SCADA system security, control network security, communication system control, data security, electrical equipment industry, IP networks, relay logic, complex systems,

  9. Chauncey Dumaguing

    Listed below are seven of the eight library sources needed for Project 2 research.

    Thompson, K. (2013, February 1). Staying power. Popular Science, 282(2), p.39-42.

    “A modern grid, capable of creating and delivering efficient, reliable power even in the midst of disaster, is long overdue” (Thompson, 2013, p.40).
    “Such infrastructure would be more resilient to both storms and terrorist attacks, which the National Research Council warned in November could cripple entire regions of the country for months” (Thompson, 2013, p.40).
    “‘Natural-gas systems also kept much of the Princeton University campus and a sprawling Bronx apartment complex known as Co-op City up and running. Critical services such as hospitals, hotels, and fire stations should all have self-sufficient power generation,’ says Kelly” (Thompson, 2013, p.43).
    Keywords: Electric grid, power generation

    Alexander, D. (2012, October 1). Electric developments for the infantry. Military Technology, 36(10), pp.46-48, 65-67.

    “Integrated power systems for military land vehicles has become a key element of next generation designs” (Alexander, 2012, p.46).
    “Collectively called MEP, military electric power generation and distribution systems come in a variety of sizes, shapes and attributes, but all play critical roles in force protection and force sustainment operations in fixed or mobile settings” (Alexander, 2012, p.65).
    Keywords: MEP/military electric power

    Blake, B. (2009, May 1). Grid unlocked. Washington Monthly, 41, p.A9-A13.

    “Typically, putting up rooftop solar panels also means installing a tangle of wires, inverters, batteries, and other gadgets” (Blake, 2009, p.9).
    “The lack of innovation means grid operators have to rely on crude tools to manage the flow of electricity and diagnose and repair problems” (Blake, 2009, p.11).
    “Adding digital intelligence to electric devices also opens the way for sweeping innovation in dozens of other industries, from automaking to appliance manufacturing” (Blake, 2009, p.12).
    Keywords: Solar panels, digital intelligence

    Roman, H, T. (2005, March 1). Transformers and the electric utility system. Tech Directions, 64(8), p.22-25.

    “Transformers are the main components of a modern electric power system” (Roman, 2005, p.22).
    “They easily convert alternating current and voltage to a variety of levels, making it economical to transport electricity over long distances” (Roman, 2005, p.22).
    “Large electric generators at a modern power station generally produce electricity at voltages of 10,000-20,000 V, with currents of 15,000-25,000A” (Roman, 2005, p.24).
    “Most domestic appliances in the home use 120V, while high current ones like air conditioners, electric clothes dryers and electric ranges need 240V to operate” (Roman, 2005, p.25).
    Keywords: Transformers, electric generators, voltage, current

    Moran, A. (2006, December 1). Energy in the market: the unfounded concerns about privatised electricity. Institute of Public Affairs Review, 58(4), p.30-32.

    “A dozen years ago, virtually all electricity in Australia was generated in government-owned plants, transmitted along government-owned facilities and marketed by
    government-owned retailers” (Moran, 2006, p.30).
    “The productivity of the generators has increased considerably, with the outstanding improvement having been the privatised Victorian system, both in terms of output per employee and reliability” (Moran, 2006, p.31).
    “The main problems for future supply stability stem from government activities” (Moran, 2006, p.32).

    Terrell, R. (2016, November 21). The Great Smart Meter Con. New American, 32(22), p.17-20.

    “In the cross hairs of an attack are smart meters, digital devices that replace tra­ditional automated utility meters at individual homes and businesses” (Terrell, 2016, p.17)
    “They can be read frequently, improving accuracy in recording electric power use, and they are read remotely, without utilities sending a person to document each measuring device
    in the network” (Terrell, 2016, p.17).
    “Like cellphones, smart meters transmit and receive information wirelessly. If you have a smart meter, it works by ‘calling’ your utility company—sometimes called ‘chirping’—via a one or two-watt wireless radio at least once a day to deliver up-to-date readings of energy usage” (Terrell, 2016, p.20).
    Keyword: Smart meter

    Moore, A. T., Kiesling, L. (2001, February 1). Why california’s power ‘experiment’ failed. Consumers’ Research Magazine, 84(2), p.10-15.

    “In 1966, California’s legislature unanimously passed a law that allegedly sought to deregulate the state’s electricity market—and promised, amidst great fanfare and rhetoric, to usher in a new era of consumer choice and savings” (Moore and Kiesling, 2001, p.10)

  10. demi

    TO: Professor Ellis
    FROM: Demi Huang
    DATE: April 6, 2017
    SUBJECT: Project 2: Research Logbook

    McNeal, L. R. (2016). Managing our blind spot: the role of bias in the school-to-prison pipeline. Arizona State Law Journal, 48(2), 285-311. Retrieved from

    “Although originally created for the adult criminal justice system, zero tolerance rhetoric eventually emerged in the K–12 schooling context to address drug and gang activity. However, over time zero tolerance policies were expanded to include minor misconduct such as wearing hats inside the school building and class disruptions. This paradigm shift from developmentally appropriate responses to addressing student misconduct to a more punitive approach was further solidified by Congress’s adoption of the 1994 Guns Free Act. The legislative intent of this Act was to minimize the perceived threat of escalations in school violence by school officials and the general public” (McNeal, 2016)

    Nance, J. P. (2016). Students, police, and the school-to-prison pipeline. Washington University Law Review, 93(4), 952+. Retrieved from

    “One also should not underestimate the negative impact of suspending or expelling a student. Excluding a student from school, even for a short time period, disrupts that student’s educational experience and provides that student with more time and opportunities to engage in harmful or illegal activities. Ample studies demonstrate that a suspended student is less likely to advance to the next grade level or enroll in college and is more likely to drop out, commit a crime, get arrested, and become incarcerated as an adult” (Nance, 2016)

    Anonymous (2013, January 2). Seeing kids as kids; new group focused on juvenile justice system. The Indiana Lawyer. Retrieved from,270077,11059,8411&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true

    “One main entrance to the juvenile justice system is school. Suspensions and expulsions have replaced detention, and offenses on school grounds are often leading to arrests of children and incarceration. Minority and special needs students are impacted disproportionally by school discipline policies in Indiana and throughout the country” (Anonymous, 2013).

    Gutiérrez, A. (2015). School-to-prison pipeline: personal and professional experiences. Latinos and Latinas at Risk: Issues in Education, Health, Community, and Justice, 2, 528-542. Retrieved from

    “With such a favorable student-teacher ratio, one might expect the opportunity for significant educational strides. However, odd as it may sound, offender students were often not permitted to attend class as a form of punishment by Probation. Ironically, some of these students were originally incarcerated for not attending school. Considering the class size, I wondered why students were assigned what seemed to be elementary level handouts as opposed to receiving rigorous instruction in the detention facilities” (Gutiérrez, 2015, p. 533).

    Maller, D. (2014). School-to-prison pipeline. Race and Racism in the United States: An Encyclopedia of the American Mosaic, 3, 1099-1101. Retrieved from

    “Marginalized children, when labeled by the school system as “deviant” at a young age, may feel that they are not wanted, or valued, or smart—which puts them on a downward spiral from the beginning of their school experiences. Many begin to mentally drop out as early as the third or fourth grade, when the academic and behavioral demands of school may outstrip their earlier academic development and home-based support. Lack of mental health support and early intervention for children with severe emotional and behavioral problems and their families, issues of substance abuse, the absence of a positive home-based support system, or a combination of these factors often bring children into the juvenile justice system. The deeper a child gets into this system, the harder it is to get out. Once expelled from the school system, it is difficult for the child to return, making the risk of dropping out of high school a very real possibility. High school dropouts are 63 times more likely to be incarcerated than graduates from four-year colleges” (Maller, 2014, p. 1100).

    Scully, J. A. M. (2016). Examining and dismantling the school-to-prison pipeline: strategies for a better future. Arkansas Law Review, 68, 959-1010. Retrieved from,270077,11059,8411&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true

    “The final component of the pipeline was solidified as public school teachers began to feel the pressure of the No Child Left Behind Act, a law that required schools to have students perform at certain levels or face serious sanctions such as the loss of funding or the closing of the school entirely. With such serious consequences looming, teachers and administrators began to eliminate low-performing students by suspending them, transferring them to alternative programs, and/or expelling them. By eliminating these students, the schools protected their performance evaluations and made clear just how disposable some children are. As a consequence of these policies, students of color and children with learning disabilities found themselves disproportionately locked into the pipeline at alarming rates” (Scully, 2016, pp. 961-962).

    “In the 1990s, John J. Dilulio’s myth of the “superpredator” was born – a generation of kids described as the worst generation of criminals that society had ever seen. According to Dilulio, superpredators were ruthless sociopaths, with no moral conscience, that saw crime as a rite of passage and were undeterred by any sanctions. He warned society that superpredators would be coming in waves, flooding the nation’s streets over the next twenty years. “Time is running out,” he cautioned, as he urged the American public to devise strategies to limit their damage” (Scully, 2016, p. 964).

    “Several popular magazines featured stories on the predicted crime wave that these superpredators would cause. These articles featured photographs of Black boys holding handguns. Stories exacerbating fear of Black youth ran rampant. The American public embraced the superpredator myth and called for harsher sanctions against children committing crimes. Their chant “adult crime, adult time” became the mantra of legislators who dedicated themselves to trying children in adult criminal court. The most dangerous part of the superpredator construct was that it focused policymakers’ attention solely on the offenders, ignoring external social factors that contributed to the violent acts of juveniles. If a child’s DNA were responsible for the child’s bad behavior, there would be no need to fix the surrounding environment. There would be no need to address failing schools, police violence, substandard housing, dysfunctional families, or a lack of drug treatment centers. In fact, if children were genetically damaged beyond repair, the only solution would be to lock them up; there would be no need to invest in rehabilitation or delinquency programs, as the children would be inherently violent and would forever remain that way” (Scully, 2016, pp. 965-966).

    “In response to Dilulio’s warnings, policymakers in nearly every state changed the way the justice system responded to juveniles accused of committing crimes. Penalties for juvenile crimes increased, more juvenile acts became criminalized, and states empowered prosecutors and judges to transfer children from juvenile court into the adult criminal system, where they faced the harshest consequences in American history. With the advent of these changes, children who were once deemed capable of redemption were, for all intents and purposes, considered to be garbage, worthy of nothing but disposal. The public’s fear of youth grew, resulting in the implementation of harsh policies designed to combat these superpredators” (Scully, 2016, pp. 966-967).

    “Trivial offenses such as bringing a water gun or a plastic axe to school were punished under zero tolerance policies. Some students received out-of-school suspensions for being late, skipping school, and for asking too many questions […] The use of zero tolerance policies is so widespread and outrageous that many of these extremely punitive incidents occur as early as pre-school and elementary school, setting the tone for young children to expect severe discipline. Research indicates that the earlier children are exposed to the criminal justice system, the more likely they are to be caught in a cycle of criminal activity resulting in the commission of crimes later in life” (Scully, 2016, pp. 969-970).

    “Similarly, a six-year-old in Florida, Desre’e Watson, was arrested for throwing a temper tantrum at school. She was transported to the juvenile detention center, where she was fingerprinted and had a mug shot taken. A large number of elementary and middle school children between the ages of ten and thirteen have also been impacted. Consider the following cases:

    An Ohio fifth grader was suspended from his elementary school for three days because he pointed his finger in the shape of a gun and pulled an imaginary trigger while playing with his friends; the letter from the principal to the parents cited his finger as a “level 2 lookalike firearm.”

    A twelve-year-old junior high school student in New York City was handcuffed and escorted to the local precinct station for doodling on her desk with an erasable marker.

    A thirteen-year-old girl in New York City was taken from school in handcuffs because she wrote the word “Okay” on her desk.

    An eleven-year-old was charged with “criminal mischief” for breaking a knick-knack on his teacher’s desk in Arapahoe County, Colorado.

    A thirteen-year-old student in Florida was arrested for repeatedly “passing gas” and turning off his classmates’ computers during class.

    A thirteen-year-old boy in Colorado was arrested and charged with “unlawful sexual contact” after he tapped his friend on the bottom for making a good play during a basketball game“ (Scully, 2016, pp. 970-971).

    Keywords: school to prison pipeline, no child left behind

  11. Leonardo Calegare

    TO: Professor Ellis
    FROM: Leonardo Calegare
    DATE: April 6, 2017
    SUBJECT: Project 2, Research Logbook Update

    *Sanctuary Cities and Secure Communities

    Haymes, M.V., & Haymes, S. (2014). Sanctuary Cities and Secure Communities. In Undocumented Immigrants in the United States: An Encyclopedia of Their Experience. (Vol. 2, pp.625-629). Santa Barbara, CA: Greenwood.

    “Sanctuary cities are municipalities that have policies and /or practices that in general ask city employees to refrain from actions that can contribute to the deportation of undocumented immigrants in their community. Cities with formal sanctuary policies generally instruct city employees and agencies to neither make inquiries about the immigration status of individuals seeking services or the protection of its laws, nor report on the immigration status of the individual to the Department of Homeland Security’s (DHS) Immigration and Customs Enforcement (ICE), nor use city resources to enforce federal immigrant legislation.” ( Haymes & Haymes, 2014, p. 625).
    “More specifically, sanctuary policies generally specify that local law enforcement officers do one or more of the following: “(1) limit inquiries about a person’s immigration status unless investigating illegal activity other than mere status as an unauthorized alien (‘don’t ask’); (2) limit arrests or detentions for violation of immigration laws (‘don’t enforce’); and (3) limit provision to federal authorities of immigration status information (‘don’t tell’).” ( Haymes & Haymes, 2014, p. 625).

    *Immigration Law

    Weiss, M.J. (2010). Immigration law. In Encyclopedia of American Immigration. (Vol. 2, pp. 549-552). Pasadena, CA: Salem Press.

    “Branch of law that deals with the entry and settlement of alien nationals in the United States” (Weiss, 2010, p. 549).

    “Primarily because of the need for labor and the spacious frontier, there was unrestricted immigration during the first one hundred years of the U.S. government’s existence. After the Civil War, federal law began to reflect restrictions on the immigration of certain groups, and in 1875 Congress passed a law barring convicts and prostitutes from admission. These were among the first of many “quality control” exclusions based on the nature of the immigrants. The list of unacceptable types of immigrants continued to grow in subsequent legislation. The Immigration Act of 1882, considered the first-general federal immigration act, added “lunatics,” “idiots,” and those likely to become public charges to the exclusionary list. ” (Weiss, 2010, p. 549).

    *Immigration and Customs Enforcement (ICE)

    Muñoz, R.G. (2014). Immigration and Customs Enforcement (ICE). In Undocumented Immigrants in the United States: An Encyclopedia of Their Experience. (Vol. 1, pp. 368-372. Santa Barbara, CA: Greenwood.

    “ICE is the acronym for Immigration and Customs Enforcement, the agency responsible for the enforcement of immigration law in the U.S. interior. ICE was formed in 2003 as a result of a governmental reorganization that merged the Immigration and Naturalization Service (INS) and the U.S. Customs Service and gave the newly formed Department of Homeland Security (DHS) oversight over immigration matters. With a $5.8 billion annual budget (as of 2012) and more than twenty thousand employees across the United States and in 48 other countries, ICE is the second largest investigative agency of the U.S. federal government” (Muñoz, 2014, p. 368).

    “For unauthorized immigrants, widespread collaboration between ICE and local law enforcement reduces the ability to travel within the United States, even to and from work, and to be in public spaces without fear of deportation. This has ramifications for work, social life, consumption practices, and overall quality of life of unauthorized people. For example, unauthorized immigrants in highly policed areas are more likely to accept a job with poor working conditions that is close to their home, rather than risk traveling to search for a better job. Unauthorized immigrants may also concentrate in relatively safe spaces, such as urban communities, rather than in suburban or rural areas in which local police actively cooperate with ICE. As ICE pushes to make Secure Communities mandatory across the United States, these effects are likely to multiply.” (Muñoz, 2014, p. 371).

    Keywords: Sanctuary Cities, Immigration Law, Immigration and Customs Enforcement (ICE),

  12. sonja

    To: Professor Ellis
    From: Sonja Goulbourne
    Date: 4/6/2017
    Subject: Research Log Book
    Research Paper Topic: Criminal Justice Reform

    1. New York Times Online
    Foreman, J. (2017,March 25). Justice Springs Eternal. The New York Times, OPINION; Pg. 1
    “In 2015, the number of American prisoners declined more than 2 percent, the largest decrease since 1978. By 2014, the incarceration rate for black men, while still stratospheric, had declined 23 percent from its peak in 2001. Even growing numbers of Republicans were acknowledging the moral and fiscal imperative of shrinking the prison state.” (Foreman, 2017)
    Retrieved From:

    2. American Civil Liberties Union
    ACLU. (2017, April 6) Criminal Justice Reform
    “What You Need To Know:
    790%The federal prison population has increased by almost 790 percent since 1980.
    3.73 In the United States, a black person is 3.73 times more likely to be arrested for marijuana possession than a white person is, despite approximately equal rates of use.
    3,278 At least 3,278 people were serving life sentences without parole for drug, property, and other nonviolent crimes in 2012.” (ACLU, 2017)
    Retrieved from:

    3. Huffington Post
    Hines, R. (2016, April 22) Trump’s election and criminal justice reform.
    “Trump has referred to nonviolent offenders who benefited from recent sentencing reforms as “dangerous drug-trafficking felons and gang members who prey on civilians.” He has also said he wants to pass new federal mandatory minimums for nonviolent offenders in his first 100 days in office.” (Hines, 2016)
    Retrieved from:

    4. Washington Post
    Horwitz, S. Lower; W. Newman Tony, R. (2016) Obama’s crusade against a criminal justice system devoid of ‘second chances.
    “In July 2015, six-and a half years into his presidency, Obama gave his first major criminal justice speech to a crowd of more than 3,000 at the NAACP convention in Philadelphia. He declared that the U.S. criminal justice system was not as “smart” as it needs to be: “It’s not keeping us as safe as it should be. It is not as fair as it should be. Mass incarceration makes our country worse off, and we need to do something about it.” (Horwitz, 2016)
    Retrieved from:

    5. Alexander M. (2010) The New Jim Crow: Mass Incarceration in the Age of Colorblindness
    “The fact that more than half of the young black men in many large American cities are currently under the control of the criminal justice system (or saddled with criminal records) is not—as many argue—just a symptom of poverty or poor choices, but rather evidence of a new racial caste system at work.“ (p 16)

    6. Hirsch, Adam Jay (1992). The Rise of the Penitentiary: Prisons and Punishment in Early America. New Haven, CT: Yale University Press.

  13. Isaiah

    TO: Professor Ellis
    FROM: Isaiah Emanuel
    DATE: April 6, 2017
    SUBJECT: Project 2, Research Logbook

    Multivariable control of a test bed for differential gears.
    Detail Only Available
    Academic Journal
    By: Forstinger, Martin; Bauer, Robert; Hofer, Anton; Rossegger, Wilfried. Control Engineering Practice. Dec2016, Vol. 57, p18-28. 11p. DOI: 10.1016/j.conengprac.2016.08.010.

    Forstinger, M., Bauer, R. Hofer, A., Rossegger, W. (2016). Control Engineering Practice. 57, 18-28.
    “Common problems related to the control of power train test beds are the coupling of the two typical controlled variables rotational speed and testing torque as well as resonant torque oscillations” (Forstinger et al., 2016, p. 18).

    Study of Vibrations in a Short-Span Bridge Under Resonance Conditions Considering Train-Track Interaction.
    Full Text Available
    Academic Journal
    By: Ribes-Llario, Fran; Velarte-Gonzalez, Jose Luis; Perez-Garnes, Jose Luis; Real-Herráiz, Julia Irene. Latin American Journal of Solids & Structures. 2016, Vol. 13 Issue 7, p1236-1249. 14p. DOI: 10.1590/1679-78252773.

    Ribes-Llario, F., Velarte-Gonzalez, J., Perez-Garnes, J., Real-Herráiz, J. (2016). Latin American Journal of Solids & Structures, 13(7), 1236-1249.
    “Resonance is a phenomenon of utmost importance in railways engineering, leading to vast damages both in track and vehicles” (Ribes-Llario et al., 2016, p. 1236).


    Peak Power Demand and Energy Consumption Reduction Strategies for Trains under Moving Block Signalling System.
    Full Text Available
    Academic Journal
    By: Qing Gu; Tao Tang; Fang Cao; Karimi, Hamid Reza; Yongduan Song. Mathematical Problems in Engineering. 2013, p1-11. 11p. DOI: 10.1155/2013/940936.

    Qing, G., Tao, T., Fang, C., Karimi, H., Yongduan, S. (2013). Problems in Engineering, 1-11.
    “In the moving block signalling (MBS) system where the tracking target point of the following train is moving forward with its leading train, overload of the substations occurs when a dense queue of trains starts (or restarts) in very close distance interval” (Qing et al., 2013, p. 1).

    Data-driven train operation models based on data mining and driving experience for the diesel-electric locomotive.
    Detail Only Available
    Academic Journal
    By: Zhang, Chun-Yang; Chen, Dewang; Yin, Jiateng; Chen, Long. Advanced Engineering Informatics. Aug2016, Vol. 30 Issue 3, p553-563. 11p. DOI: 10.1016/j.aei.2016.07.004.

    Zhang, C., Chen, D., Yin, J., & Chen, L. (2016). Data-driven train operation models based on data mining and driving experience for the diesel-electric locomotive. Advanced Engineering Informatics, 30(3), 553-563. “Traditional control methods in automatic train operation (ATO) models have some disadvantages, such as high energy consumption and low riding comfort” (Zhang et al., 2016, p. 553).


    Analysis of Handover Trigger Scheme Based on Distance for LTE High-speed Railway Networks.
    Full Text Available
    Academic Journal
    By: Rui Zhang; Muqing Wu; Yifan Zhang. Telkomnika. Mar2016, Vol. 14 Issue 1, p129-135. 7p. DOI: 10.12928/TELKOMNIKA.v14i1.2742.

    Rui, Z., Muqing, W., & Yifan, Z. (2016). Analysis of Handover Trigger Scheme Based on Distance for LTE High-speed Railway Networks. Telkomnika, 14(1), 129-135. “In high-speed railway environment, frequent handovers and high handover failure probability result in serious communication interruptions and call drops, which become pressing problem to be solved” (Rui et al., 2016, p. 129).

    Design of a Fatigue Detection System for High-Speed Trains Based on Driver Vigilance Using a Wireless Wearable EEG.
    Full Text Available
    Academic Journal
    By: Xiaoliang Zhang; Jiali Li; Yugang Liu; Zutao Zhang; Zhuojun Wang; Dianyuan Luo; Xiang Zhou; Miankuan Zhu; Salman, Waleed; Guangdi Hu; Chunbai Wang. Sensors (14248220). Mar2017, Vol. 17 Issue 3, p1-21. 21p. 8 Color Photographs, 2 Diagrams, 14 Charts, 5 Graphs. DOI: 10.3390/s17030486.

    Xiaoliang, Z., Jiali, L., Yugang, L., Zutao, Z., Zhuojun, W., Dianyuan, L., & … Chunbai, W. (2017). Design of a Fatigue Detection System for High-Speed Trains Based on Driver Vigilance Using a Wireless Wearable EEG. Sensors (14248220), 17(3), 1-21. “The vigilance of the driver is important for railway safety, despite not being included in the safety management system (SMS) for high-speed train safety. In this paper, a novel fatigue detection system for high-speed train safety based on monitoring train driver vigilance using a wireless wearable electroencephalograph (EEG) is presented” (Xiaoliang et al., 2017, p. 1).

    Predictive modelling of the granulation process using a systems-engineering approach.
    Detail Only Available
    Academic Journal
    By: AlAlaween, Wafa’ H.; Mahfouf, Mahdi; Salman, Agba D. Powder Technology. Nov2016, Vol. 302, p265-274. 10p. DOI: 10.1016/j.powtec.2016.08.049.

    AlAlaween, W. H., Mahfouf, M., & Salman, A. D. (2016). Predictive modelling of the granulation process using a systems-engineering approach. Powder Technology, 302265-274. “The granulation process is considered to be a crucial operation in many industrial applications” (AlAlaween et al., 2017, p. 265).

    Adaptive Iterative Learning Control for High-Speed Trains With Unknown Speed Delays and Input Saturations.
    Detail Only Available
    Academic Journal
    By: Ji, Honghai; Hou, Zhongsheng; Zhang, Ruikun. IEEE Transactions on Automation Science & Engineering. Jan2016, Vol. 13 Issue 1, p260-273. 14p. DOI: 10.1109/TASE.2014.2371816.

    Ji, H., Hou, Z., & Zhang, R. (2016). Adaptive Iterative Learning Control for High-Speed Trains With Unknown Speed Delays and Input Saturations. IEEE Transactions On Automation Science & Engineering, 13(1), 260-273. doi:10.1109/TASE.2014.2371816 “he train motion dynamics containing nonlinearities and parametric uncertainties are formulated as a nonlinearly parameterized system” (Ji et al., 2016, p. 260).

    Keywords: Systems engineering, simulation, train depot, reliability, trains

  14. luisvasconez23

    To: Professor Ellis
    From: L. L. Vasconez
    Date: April, 6 2017
    Subject: Project 2, Research Logbook Update

    Author, A. A., Author, B. B., & Author, C. C. (Year). Title of article. Title of Periodical, volume number(issue number), pages.

    Coyle, T. (2000). What is (and isn’t) the National Electrical Code?. Engineered Systems, 17(7), 44.

    “The NEC is produced and distributed by the National Fire Protection Association (NFPA).” (Coyle, 2000 , Par. 3).

    “It applies to installation of electrical conductors and equipment in or on almost all public and private buildings and structures” (Coyle, 2000 , Par. 3).

    “The purpose of this Code is the practical safeguarding of persons and property from hazards arising from the use of electricity” (Coyle, 2000 , Par. 4).

    “The safety of an electrical installation involves not only the initial conditions of the installation, but the maintenance and future use of it as well” (Coyle, 2000 , Par. 5).

    Your Estimate and the National Electrical Code

    Your estimate and the national electrical code. (2013, November 15). EC&M Electrical Construction & Maintenance. Retrieved from

    “The NEC is a product of the National Fire Protection Association (NFPA), an organization that writes and produces copyrighted standards and codes for usage and adoption by local governments and agencies.” (Your Estimate, 2013, Par. 4).

    “The NEC is also known as NFPA 70, which covers the standards for safe installation of electrical wiring and equipment.” (Your Estimate, 2013, Par. 4).

    “While the NEC governs the installation of electrical materials, the ADA governs the mounting heights and locations of devices such as switches and receptacles” (Your Estimate, 2013, Par. 5).

    “The NEC is organized by chapter. Chapters 1 through 4 cover installation of items while Chapters 5 through 7 address special occupancy, equipment, or conditions. Chapter 8 covers communications, and Chapter 9 contains tables for references such as wire fill tables.” (Your Estimate, 2013, Par. 6).

    -I can use this website as my 9th source to explain where does NEC comes from.

    Voltage Levels and the National Electrical Code

    Voltage levels and the national electrical code. (2017, March 10). EC&M Electrical Construction & Maintenance. Retrieved from

    “The terminology — low, medium, and high voltage — are relative to the field you are in and which context is being used” (Voltage Levels, 2017, Par. 1).

    Improving Safety One Rule at a Time

    Improving safety one rule at a time. (2016, November 18). EC&M Electrical Construction & Maintenance. Retrieved from

    “…more than 4,000 proposals and acting on each one of them, the National Fire Protection Association (NFPA) published the 2017 National Electrical Code (NEC)” (Improving Safety, 2016, Par. 2)

    What technicians need to know about cable & the NEC: a common myth is that the National Electrical Code only deals with high-voltage electricity. Not true

    Stepanek, L. (2007, December). What technicians need to know about cable & the NEC: a common myth is that the National Electrical Code only deals with high-voltage electricity. Not true. Security Distributing & Marketing, 37(12), 71+. Retrieved from

    “The National Electrical Code, or NEC, protects the public by establishing requirements for electrical wiring and equipment in virtually all buildings” (Stepank, 2007, Par. 2).

  15. Daniel

    TO: Professor Ellis
    FROM: Daniel. O. L
    DATE: April 6, 2017
    SUBJECT: Project 2 Research LogBook Updated

    Topic: Patent Reform; Electrical Engineering

    This topic is important to understand as it ties the passion of a study to the politics of the businesses world.

    IEEE-USA Tells Congress that Patent Reform Is Essential to Economic Recovery.
    Detail Only Available
    Academic Journal
    By: Stern, Richard. IEEE Micro, March/April 2009, Vol. 29 Issue 2, p64-65, 2p; DOI: 10.1109/MM.2009.32

    Stern (2009).IEEE-USA Tells Congress that Patent Reform Is Essential to Economic Recovery.IEEE Xplore. 29(2), p.64

    “But that ability has been impaired, IEEE-USA maintains, because the current management of the Patent and Trademark Office (PTO) and the statutory limitations on the agency’s authority have resulted in serious ‘‘disincentives to American inventiveness.’’ (Stern 2009)

    Oliver Heaviside—An inventor who failed to file crucial patents
    Detail Only Available
    Academic Journal
    By: Spear, Brian. World Patent Information. Sep 2006, Vol. 28 Issue 3, p248-250. 3p. DOI: 10.1016/j.wpi.2005.11.002.

    Spear (2006). Oliver Heaviside—An inventor who failed to file crucial patents. World Patent Information. 28(3), p.248–250

    “Oliver Heaviside was an inventor who had a good insight into the mathematical basis behind much electrical engineering of the late 19th century. He was also able to apply his theoretical knowledge to practical problems; however, he seems to have had but a single patent. The author seeks to explore the reasons behind Heaviside’s lack of patents to protect and exploit his inventions.” (Spear, 2006)

    Post-Grant Review: A Promising New Tool for Invalidating Patents?
    Full Text Available
    Academic Journal
    By: Miller, Jeffrey A.; Scott, Katie J. L.; Phan, Scott. Intellectual Property & Technology Law Journal , Mar2017, Vol. 29 Issue 3, p3-9, 7p, 1 Diagram, 1 Chart, 1 Graph

    Miller, Scott, Phan (2017).Post-Grant Review: A Promising New Tool for Invalidating Patents? . Intellectual Property & Technology Law Journal. 29(3) p3-9

    “While Congress intended the PGR process to be similar to European opposition proceedings, to date, PGR has not been nearly as popular. In contrast to the small number of PGR filings, the European Patent Office (EPO) reports that the opposition rate in 2015 for granted European patents was 4.4 percent, and in that same year, the EPO issued 3,713 opposition decisions.” (Miller et al. , 2017, p 3)

    Software Patents Are Falling Down.
    Full Text Available
    Academic Journal
    By: Samuelson, Pamela. Communications of the ACM, Nov2015, Vol. 58 Issue 11, p27-29, 3p, 1 Color Photograph; DOI: 10.1145/2822511

    Samuelson (2015).Software Patents Are Falling Down. . COMMUNICATIONS OF THE ACM. 58(11), p.27

    “Novel and nonobvious machines, manufactures, compositions of matter, and processes are eligible for patenting so long as these subject matters are properly claimed and vetted through the patent examination process. Because software is a virtual machine and a technological process, some contend that software innovations should always qualify as pat-
    entable inventions. However, since the Supreme Court’s decision in Gottschalk v. Benson in 1972, this contention has been, in a word, contentious” (Samuelson, 2015, p 27)

    Keywords : United States Patent and Trademark Office, Intellectual Property, Engineering,

  16. Win

    TO: Professor Ellis
    FROM: Win Naing
    DATE: April 6, 2017
    SUBJECT: Project 2, Research Logbook Update

    Research on Info-graphics:

    “People learn and remember more efficiently and effectively through the use of text and visuals than through text alone. Infographics are one way of presenting complex and dense infor-
    mational content in a way that supports cognitive processing, learning, and future recognition and recollection.“

    Dunlap, J. C., & Lowenthal, P. R. (2016). Getting graphic about infographics: design lessons learned from popular infographics. Journal Of Visual Literacy, 35(1), 42-59. doi:10.1080/1051144X.2016.1205832

  17. Doneek Drumgo

    Microelectronics: Differential Amplifiers.
    Full Text Available
    By: EMILIO, MAURIZIO DI PAOLO. Electronics World, Feb2014, Vol. 120 Issue 1934, p42-43, 2p

    Emilio, M. (2014). Microelectronics: differential amplifiers. Electronics World, 120(1934), 42-43

    Quote: “Microelectronics has changed our lives,with mobile phones, digital cameras, laptop computers and other devices becoming an integral part” ( Emilio, 2014, p.42).

    Source Citation (MLA 8th Edition)
    “Microelectronics Industry.” International Encyclopedia of the Social Sciences, edited by William A. Darity, Jr., 2nd ed., vol. 5, Macmillan Reference USA, 2008, pp. 136-139. Gale Virtual Reference Library, Accessed 6 Apr. 2017.

    Darity, W. (2008). Microelectronics industry. In William D. (Ed.), International encyclopedia of the social sciences (pp.136-139). Detroit, MI: Macmillan Reference USA

    Quote: “Many aspects of the telecommunications industry, such as bandwidth, the speed at which data can be transmitted, the use of high-speed fiber optic cable, and satellite and wireless communications, rely on the microchip in one way or another” ( Darity, 2008, p.137).

    Source Citation (MLA 8th Edition)
    Dickerson, Louise. “Microtechnology.” The Gale Encyclopedia of Science, edited by K. Lee Lerner and Brenda Wilmoth Lerner, 5th ed., vol. 5, Gale, 2014, pp. 2804-2807. Gale Virtual Reference Library, Accessed 6 Apr. 2017.

    Dickerson, L. (2014). Microtechnology. In K.L. Lerner & B.W. Lerner (Eds.), The gale encyclopedia of science (pp.2804-2807). Farmington Hills, MI: Gale

    Quote: “Microtechnology has the advantages of taking up less space, using less construction material, and costing less money” (Dickerson, 2014, p.2804-2807).

    Source Citation (MLA 8th Edition)
    “Miniaturization.” Space Sciences, edited by John F. McCoy, 2nd ed., vol. 4: Our Future in Space, Macmillan Reference USA, 2012, pp. 184-188. Gale Virtual Reference Library, Accessed 6 Apr. 2017.

    McCoy, J.F. (2012). Miniaturization. In J.F. McCoy (Ed.), Space Sciences (pp.184-188). Detroit, MI: Gale

    Quote: “Nanotechnology innovations in computer design can help shrink systems” (McCoy, 2012, p. 185).

    Keywords: Microelectronics, Integrated Circuits, Exobiology, Microprocessor

  18. Ronald Hinds

    TO: Professor Jason W. Ellis

    FROM: Ronald C. Hinds

    DATE: April 06, 2017

    SUBJECT: Project 2, Research


    Longo, B. (2000). Spurious Coin: A History of Science, Management, and Technical Writing. Technical Communication Quarterly, 105-107.

    Longo argues “that the writing part of technical communication emerged in history primarily as a medium for making scientific knowledge useful to the capitalist production system. It does so by translating the abstractions of science into useful economic output” (Longo, 2000. p.105).

    Keywords: Abstractions, economic output, medium.

    Ramsey, R. D. (1993). Supervision.

    National Research Bureau, 54.7. p.3.


    “Finally, hiring managers and professionals share different perceptions of error. Understanding these differences can produce better assessment tools and better prepare test takers” (Ramsey, 1993. p.3).

    Keywords: Perceptions of error, assessment tools, test takers

    Russell, D.R. (1989). International Professional Communication Conference. Communicating to the World, p. 39-41


    “I began teaching technical writing in 1981 at Texas Tech University, having spent the six preceding years working as a technical writer in a research center in developmental disabilities. As a technical writer, I wrote proposals and instructional materials”

    Keywords: Developmental disabilities, instructional methods

    Nelkin, D. (1990). Selling science. Physics Today. Vol.43 (11), p. 41.

    “For most people the reality of science is what they read in the press. They understand science less through direct experience or past education than through the filter of journalistic language and imagery”

    Keywords: reality of science, filter, language and imagery


    Williams Dudley, J. (Spring, 1977). Griffin in the English department: the uses of technical writing. English Education, 8(3), 174-181.

    “I believe that exercises in mechanism and process description, establish standards and specifications, and making multiple evaluations will sharpen the rhetorical skills which a composition course is, by tradition, supposed to inculcate”

    Keywords: Mechanism, specifications, rhetorical skills, inculcate

  19. Win

    TO: Professor Ellis
    FROM: Win Naing
    DATE: April 25, 2017
    SUBJECT: Project 2, Research Logbook update

    (this is an update for April 6th research)

    The following are 9 references for my research-based project 2: Infographics.

    1) “Graphic Design is a visual communication. Visual communication combines speech, written language, and imagery into messages that are aesthetically pleasing, connect with the audience on intellectual and emotional levels,and provide them with pertinent information. When properly executed, graphic design identifies, informs, instructs, interprets, and even persuades viewers to do something.” (p. 14)

    “When executed poorly, design can create mass confusion. The infamous “butterfly ballot” designed by the Florida Electronics office (instead of a graphic designer) may have inadvertently led people to vote for the wrong candidate.” (p. 15)

    Hembree, R. (2006). The complete graphic designer. Massachusett, MA: Rockport Publishers.
    Keywords: visual communication, aesthetic, intellectual, inform, interpret

    2) “The origins of infographics: The foundation of information graphics is analytic geometry, a bunch of geometry developed and first used in 1637 by the French philosopher, mathematician, and scientist René Descartes (1596-1650). Descartes used algebra to solve geometry problems, formulate equations to represent lines and curves and represent a point in space by a pair of numbers.”

    “Cartesian coordinates and other aspects of analytic geometry were later used by the Scott author and scientist William Playfair (1759-1823) to convert statistical data into symbolic graphics.” (p. 125)

    Meggs, P.B., and Purvis, A.W., (2006). Meggs’ History of Graphic Design. New Jersey, NJ: John Wiley & Sons, Inc.,
    Keywords: statistic, data, symbolic, graphics, geometry

    3) “This Rosetta stone, as it would become known, enabled scholars to use their extensive knowledge of Greek to comparatively translate the Egyptian texts, which turned out to be hieroglyphics and Demotic, a cursive form of hieroglyphic script. The Rosetta stone illustrates the power of embedding elements of common understanding in messages to ensure that their meaning can be unlocked by a receiver who may not understand the language of transmission. This principal has broad applications, ranging from the design the development of games and puzzles (eg., crossword puzzles) to devising communications for extraterrestrial intelligences (e.g., plaques designed for the Pioneer 10 and Pioneer 11 space probes.)”(p. 206)

    Lidwell, W., Holden, K., and Butler, J. (2003) Rosetta Stone, Universal Principals of Design. Massachusett, MA: Rockport Publishers.
    Keywords: Rosetta stone, hieroglyphics, demotic, transmission, extraterrestrial

    4.1) “More and more, everyone from news organizations to advertising agencies relies on infographics to deliver content to audiences. Infographics- as in information graphics– present information graphically, Partner the reporter’s nose for sniffing out a good story with designer’s eye for visualization it, and you’ve got infographics.” (p. 154)

    “You might need an infographic if
    You need to communicate quickly.
    A verbal or written account is too complicated- or tedious-for comprehension.
    Your audience can’t hear or read well-or at all”
    4.2) Infographic: An infographic delivers information graphically, such as graphs, charts, maps, figures and diagrams. (p. 249)

    Golombisky, K. & Hagen, R. (2010). White space is not your enemy. Oxford, UK: Focal Press.
    Keywords: visualization, information graphics, infographics, contents, graphically

    5) “Diagramming Editorial Content: Contemporary magazine design often breaks up content, dispersing elements across the page and integrating words and images to create engaging, nonlinear experiences for readers. Principles of diagramming and mapping are thus used to organize narrative in a special way. Information graphic typically combine visual and verbal information, requiring mastery of both literate human mind has no difficulty switching between seeing and reading.”(p. 211)

    Lupton, E. and Phillips, J.C. (2008). Graphic design the new basics. New York, NY: Princeton Architectural Press.
    Keywords: diagramming, mapping, editorial contents, narrative, visual and verbal information

    6) “People learn and remember more efficiently and effectively through the use of text and visuals than through text alone. Infographics are one way of presenting complex and dense informational content in a way that supports cognitive processing, learning, and future recognition and recollection.” (p. 42)

    Dunlap, J. C., & Lowenthal, P. R. (2016). Getting graphic about infographics: design lessons learned from popular infographics. Journal Of Visual Literacy, 35(1), 42-59. doi:10.1080/1051144X.2016.1205832
    Keywords: infographics, informational content, cognitive process, future recognition, recollection

    7) “The World Economic Forum needed a report that could capture the complex challenges facing our planet and inspire the world’s biggest brains to solve them. My role was to work with the art director, Victoria Talbot, on the tip-in data visualizations. We discovered visual solutions to represent the data produced by survey questions such as: ‘How great a problem does water pollution pose around the world?’ and: ‘Which region will be most affected by deepening income inequality in the next 12-18 months?’ (p. 84)

    Knight, E. L, Graphic Designer. (February, 2015). Convert complex data into clear infographics. Computer Arts. 236, 83-85.
    Keywords: data visualization, art director

    8) First Bar Chart and Time Series

    “The Scottish engineer William Playfair has been credited with inventing the line, bar, and pie charts. His time-series plots are still presented as models of clarity. Playfair first published The Commercial and Political Atlas in London in 1786. It contained 43 time-series plots and one bar chart. It has been described as the first major work to contain statistical graphs. Playfair’s Statistical Breviary, published in London in 1801, contains what is generally credited as the first pie chart.” (p. 3)

    “Cholera Map
    In 1854, the physician John Snow mapped the incidence of cholera cases in London to determine the linkage to contaminated water from a single pump, as shown in Figure 1-3. Prior to that analysis, no one knew what caused cholera. This is believed to be the first time that a map was used to analyze how disease is spread.” (p. 4)

    Dunlop, N. (2013). Beginning Big Data with Power BI and Excel 2013. New York, NY :Apress

    9) “Florence Nightingale produced the original Diagram of the Causes of Mortality in the Army in the East in late 1858. It showed that most of the British soldiers who died during the Crimean War died of sickness (blue) rather than of wounds or other causes (red or black). It also showed that the death rate was higher in the first year of the war (right half of diagram), before improvements in the treatment of soldiers reduced sickness. She used this diagram to show that we can control epidemic disease – something that was not obvious in her day.”

    Retrieved from

  20. sjm

    TO: Professor Ellis
    FROM: Steven Mathieu
    DATE: 04/28/2017
    SUBJECT: Research Logbook Update

    A Data Science Model for Big Data Analytics of Frequent Patterns.
    By: Carson K. Leung ; Fan Jiang ; Hao Zhang ; Adam G.M. Pazdor. 2016, p 866-873.

    “Frequent pattern mining is an important data mining task. Since its introduction, it has drawn attention from many researchers. Consequently, many frequent pattern mining algorithms have been proposed, which include level-wise Apriori-based algorithms, tree-based algorithms, and hyperlinked array structure based algorithms.”
    (Leung, Jiang, Zhang, Pazdor, 2016, p. 866).

    Keywords: Data Mining, Algorithms, Big Data Analytics.

    Carson K. Leung ; Fan Jiang ; Hao Zhang ; Adam G.M. Pazdor (2016). A Data Science Model for Big Data Analytics of Frequent Patterns. 11(4), 866-873. Doi:10.1109/DASC-PICom-DataCom-CyberSciTec.2016.148

    Big data and the regulation of financial markets.
    By: Sharyn O’Halloran ; Sameer Maskey ; Geraldine McAllister ; David K. Park ; Kaiping Chen. 02/11/2016, p11.

    “The development of computational data science techniques in natural language processing (NLP) and machine learning (ML) algorithms to analyze large and complex textual information opens new avenues to study intricate processes, such as government regulation of financial markets, at a scale unimaginable even a few years ago. ”

    (Halloran, Maskey, McAllister, Park,Chen, 2016).

    Keywords: Computational Analysis, Financial, Natural Language Processing.

    (Halloran, Maskey, McAllister, Park,Chen, 2016). Big data and the regulation of financial markets.

    A Survey of Game Theoretic Methods for Cyber Security.
    By: Yuan Wang ; Yongjun Wang ; Jing Liu ; Zhijian Huang ; Peidai Xie. Jan 2017.

    “Cyber security has been heavily studied in both industry and academia, but the traditional security technology is still facing unprecedented challenges in the background of massive and complicated network traffic. Game theory as a mathematical model of conflict and cooperation between intelligent rational decision-makers has great potential to improve cyber security.”
    (Jan, 2017)

    Keywords: Cyber Security, Network traffic, Game theory

    Wang, Liu, Huang, Xie. (2017). A Survey of Game Theoretic Methods for Cyber Security.03.02.2017.

    Quality assurance for data science: Making data science more scientific through engaging scientific method. By: Narada Wickramage, Tho. EURASIP Journal on Wireless Communications & Networking. 9/27/2015, Vol. 2015 Issue 1, p1-14. 14p

    “Credibility of science is fundamentally due to the strenuous efforts made to verify the general consistency among relevant facts, theories, applications, research methodologies, etc. and scientific method which emphasizes the significance of continuously building and testing hypotheses has withstood the test of time as a successful methodology of acquiring a body of knowledge, we can rely on, at least within a certain context. ”

    Keywords: Cyber security, Network traffic, Game theory

    Data science for software engineering.
    Microwaves & RF. Dec2016, Vol. 55 Issue 12, p21-21. 1p. 1

    “Software practitioners and researchers wanting to understand the state of the art in using data science for software engineering (SE). Content: In the age of big data, data science (the knowledge of deriving meaningful outcomes from data) is an essential skill that should be equipped by software engineers. It can be used to predict useful information on new projects based on completed projects.”
    (Anonymous, 2016, p. 1)

    QUALCOMM TEASES A Prototype Spectrum-Sharing Radio. (2016). Microwaves & RF, 55(12), 21.

    Effectiveness of semi-supervised learning in bankruptcy prediction.
    By: Stamatis Karlos ; Sotiris Kotsiantis ; Nikos Fazakis ; Kyrgiakos Sgarbas. eWeek. 12/19/2016.

    “Adoption of techniques from fields related with Data Science, such as Machine Learning, Data Mining and Predictive Analysis, in the task of bankruptcy prediction can produce useful knowledge for both the policy makers and the organizations that are already funding or are interested in acting towards this direction in the near future.”
    (Karlos, Kotsiants, Fazakis, Sqarbas, 2016)
    Karlos, Kotsiants, Fazakis, Sqarbas, 2016.Effectiveness of semi-supervised learning in bankruptcy prediction. eWeek. 12/19/2016.

    Study on dynamic model and demonstration analysis for urban housing purchasing power measuring.
    By: Ai-hua Li ; Yong Shi. 11/7/2008

    “Housing purchasing power measuring is an important issue for the housing guarantee decision making, which has been studied in the static way. However, the consumption structure and income are not changeless. Thus the dynamic model for urban housing purchasing power is proposed and the main idea is as follows. ”
    (Li, Shi, 2017 p. 1)

    Keywords: Dynamic Model, Power, Measuring

    Aihua Li, Jun Liu, “Computation and Comparative Study of PIR and HAI with Demonstration Analysis in Beijing”, Computational Sciences and Optimization 2009. CSO 2009. International Joint Conference on, vol. 1, pp. 1012-1015, 2009.

Leave a Reply