Weekly Writing Assignment, Week 5

This Weekly Writing Assignment is meant to help you vet or evaluate where some of your research comes from and report back what you find. Watch this week’s lecture before performing this assignment so that you learn more about the process that I suggest for discovering the information requested below.

For this assignment, refer to two journal articles from different journals that you came across in your research (or, search for your Expanded Definition term again in IEEExplore and/or Academic Search Complete to find two examples for this assignment).

Using the built-in tools in the databases where you found the article and search sites like Google, DuckDuckgo, or Bing, learn more about the specialization of the journal and the kinds of research that it publishes and find out the name of the editor-in-chief and their professional background (degrees, affiliation, and research specializations).

Then, type a short paragraph in your word process of choice that identifies the name of the two journals that you investigated for this assignment and describe in your own words what each journal specializes in. And, identify each journal’s editor-in-chief and describe their professional details, such as degrees and where they were earned, their affiliation (where they work/teach), and their research specializations (if possible to find).

Finally, copy-and-paste your paragraph into a comment added to this post.

This assignment should not take very long. Focus most of your time this week on completing a draft of your Expanded Definition essay.

10 thoughts on “Weekly Writing Assignment, Week 5”

  1. TO: Prof. Jason Ellis
    FROM: Pranta Dutta
    DATE: March 10th, 2021
    SUBJECT: Week 5 writing assignment.

    One of the journals I chose is “An experimental analysis on cloud-based mobile augmentation in mobile cloud computing.” Written by Saeid Abolfazli, Zohreh Sanaei, Mojtaba Alizadeh, Abdullah Gani, Feng Xia. It publishes journals about Consumer Electronics, engineering, and research aspects of the theory, design, construction, manufacture, or end use of mass-market electronics, systems, software, and services for consumers. The editor-in-chief of this journal is Fernando Pescador, who is the Assistant Professor in Computer Science and Electronic Engineering Department at Universidad Politecnica de Madrid.

    Another journal I chose is “Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport.” Written by Jayant Baliga, Robert W. A. Ayre, Kerry Hinton, Rodney S. Tucker. Proceedings of the IEEE publishes journals in-depth review, survey, and tutorial coverage of the technical developments in electronics, electrical and computer engineering, and computer science. Gianluca Setti is the Editor in chief of this journal. He received the Dr. Eng. degree (with honors) in electronic engineering and the Ph.D. degree in Electronic Engineering and Computer Science from the University of Bologna, Bologna, Italy. He is currently a Professor of Circuit Theory and Analog Electronics in the School of Engineering at the University of Ferrara.

  2. TO: Prof. Jason Ellis
    FROM: Oluwatomi Isaac Ajeleti
    DATE: March 10th, 2021
    SUBJECT: Week 5 writing assignment

    The website journal I decided to talk about is about the Apple car from macrumors.com, labeled as “Apple’s vehicles project, focused on building an autonomous car.” As we dive into the infrastructure, ability, model, design and construction of Apple’s new project, we find out more about the creators of where the source of these rumors are coming from. Apple analyst Ming-Chi-Kuo has been at it for years with Apple when it comes to the development for new technology. He’s more of the creative design person.
    According to the macworld.com, Ming-Chi-Kou is postponed to be 70% accurate when it comes to his findings about certain things about Apple. He primarily stages in Asia but gives real artifacts on latest technology.

  3. The first article titled Computer Security focuses on the concept of records protection from phishing, spam, and viruses, through the utilization of firewalls. The article argues that protection of information over the internet is important to ensure that confidentiality, integrity, authentication, non-repudiation, availability, usability, and control of information within remote information systems. This information may be attacked by hackers during their transmission, processing, or storage. A hacker is a person that explores the vulnerabilities or weaknesses of a computer system, to breach its defenses. While some hackers break into companies to steal financial information, others breach computer systems to damage the computers, and destroy useful information by sending viruses, trojans, or spams through email or frequently visited websites. The article further states that over two hundred million records were compromised between the years 2005 and 2008 within the United States of America. The article suggests the use of a firewall to protect computers and computer systems. A firewall refers to a network device that protects computers within a network by filtering both incoming, and outgoing traffic thus allowing the traffic that meets the criteria of the firewall. That is, firewalls work by filtering data that comes from the internet to ensure that viruses, spam, and trojans do not attack a local area network.
    The second cybersecurity concepts come from the cybersecurity eBook. The article says that the more technology advances, the higher the chances of an increase in cybercrime since new technology inventions come with a new breed of crimes. Cybercrime refers to any criminal activity over the internet that targets users of a computer, or a computer network. The article by (Derbyshire, 2018) says that fighting cybercrime is just like fighting any other crime. According to the article, fifty-seven million uber users had their data deleted by a hacker, and records of clients from Equifax stolen. These cybercrimes are in form of malware, data breaches from employees that take revenge on their bosses, unauthorized access to social media or sending unauthorized emails, and compromised passwords. Therefore, solving cybersecurity risks requires the responsible party to weigh their options, and determine the possible risks of cybersecurity issues. The article argues that the government of the United States can spend millions on cybersecurity but it will not stop the rate of cybercrime from increasing. Therefore, the government can only make it hard for hackers, and crooks from attacking computer systems, and hope that the benefits of using technology will outweigh the risks that come from computer crime.
    In conclusion, cybercrime is a major issue facing not only the United States of America, but the entire world since companies are losing important records, identities are stolen, and individuals are losing important personal and financial information when these crimes occur. They can be in form of viruses, social engineering, trojans, spam, and other forms of internet attacks. Therefore, since every technology comes with a potentially related crime, security specialists should stay updated regarding technology to enable them to determine effective ways of dealing with them

  4. TO: Prof. Jason Ellis
    FROM: Mynette Dindyal
    DATE: March 10th, 2021
    SUBJECT: Week 5 writing assignment

    The first article titled Computer Security focuses on the concept of records protection from phishing, spam, and viruses, through the utilization of firewalls. The article argues that protection of information over the internet is important to ensure that confidentiality, integrity, authentication, non-repudiation, availability, usability, and control of information within remote information systems. This information may be attacked by hackers during their transmission, processing, or storage. A hacker is a person that explores the vulnerabilities or weaknesses of a computer system, to breach its defenses. While some hackers break into companies to steal financial information, others breach computer systems to damage the computers, and destroy useful information by sending viruses, trojans, or spams through email or frequently visited websites. The article further states that over two hundred million records were compromised between the years 2005 and 2008 within the United States of America. The article suggests the use of a firewall to protect computers and computer systems. A firewall refers to a network device that protects computers within a network by filtering both incoming, and outgoing traffic thus allowing the traffic that meets the criteria of the firewall. That is, firewalls work by filtering data that comes from the internet to ensure that viruses, spam, and trojans do not attack a local area network.
    The second cybersecurity concepts come from the cybersecurity eBook. The article says that the more technology advances, the higher the chances of an increase in cybercrime since new technology inventions come with a new breed of crimes. Cybercrime refers to any criminal activity over the internet that targets users of a computer, or a computer network. The article by (Derbyshire, 2018) says that fighting cybercrime is just like fighting any other crime. According to the article, fifty-seven million uber users had their data deleted by a hacker, and records of clients from Equifax stolen. These cybercrimes are in form of malware, data breaches from employees that take revenge on their bosses, unauthorized access to social media or sending unauthorized emails, and compromised passwords. Therefore, solving cybersecurity risks requires the responsible party to weigh their options, and determine the possible risks of cybersecurity issues. The article argues that the government of the United States can spend millions on cybersecurity but it will not stop the rate of cybercrime from increasing. Therefore, the government can only make it hard for hackers, and crooks from attacking computer systems, and hope that the benefits of using technology will outweigh the risks that come from computer crime.
    In conclusion, cybercrime is a major issue facing not only the United States of America, but the entire world since companies are losing important records, identities are stolen, and individuals are losing important personal and financial information when these crimes occur. They can be in form of viruses, social engineering, trojans, spam, and other forms of internet attacks. Therefore, since every technology comes with a potentially related crime, security specialists should stay updated regarding technology to enable them to determine effective ways of dealing with them

  5. TO: Prof. Ellis
    FROM: Neil Domingo
    DATE: 3/9/2021
    SUBJECT: Weekly Writing Assignment, Week 5

    AIR5: Five Pillars of Artificial Intelligence Research

    This journal focuses on the “five pillars of artificial intelligence”, the term also known as Air5 (AIR5). These five pillars are the five Rs: rationalizability, resilience, reproductivity, realism, and responsibility. These five Rs are known as the “basic elements of artificial life”. These five Rs can be used to increase research and the growth of the field of artificial intelligence. The journal article summarizes each of the five pillars, respectively. The editor in chief is Yew-Soon Ong who is the President’s Chair Professor of Computer Science at the School of Computer Science and Engineering and Professor (Cross Appointment) of the School of Physical and Mathematical Science at Nanyang Technological University (NTU), Singapore. His research focuses on Artificial & Computational Intelligence spanning Memetic Computation, Evolutionary & Transfer Optimization and Machine Learning.

    Artificial Intelligence in the 21st Century

    The journal focuses on the field of artificial intelligence and its advancement throughout the 21st century. The journal article focuses on the evolution of artificial intelligence by using numerous journals and conferences, to discuss it’s growth and impact. The editor in chief is Derek Abbot, who received his B.Sc. (Hons.) degree in physics from Loughborough University and his and the Ph.D. degree in electrical and electronic engineering from The University of Adelaide. Abbot is a Full Professor with the School of Electrical and Electronic Engineering. His research interests are multidisciplinary physics and electronic engineering applied to complex systems.

  6. TO: Prof. Jason Ellis
    FROM: Chowdhury Hashmee
    DATE: March 10th, 2021
    SUBJECT: Week 5 writing assignment

    The first article that I choose for my expanded summary is “Artificial Intelligence in the 21st Century”. The journal reports on artificial intelligence and its creation in the twenty-first century. The journal paper explores the development and effect of artificial intelligence by pointing to a number of articles and events. Derek Abbot,  serves in the Department of Engineering and Computer Science as a Senior Lecturer. Interdisciplinary physics and electrical engineering extended to multiple systems are two of his work experiences.
    The second article that I choose is “Five Pillars of Artificial Intelligence”. The five “R” rationalizability, resilience, reproductivity, realism, and responsibility, are the five foundations. The “essential elements of artificial life” are these five foundations. These five foundations should be used to maximize artificially intelligent research and development. Each of the five foundations is summarized in the journal paper. Yew-Soon Ong, the President’s Chair Professor of Computer Science and Engineering and Professor of the School of Physical and Mathematical Science at Nanyang Technological University (NTU), Singapore, is the editor in chief. The study focused on Memetic Processing, Evolutionary & Transition Computation, and Machine Learning, all of which come under the umbrella of Artificial & Artificial Intelligence.

  7. TO: Prof. Ellis 
    FROM: Shoron Reza 
    DATE: 03/23/2021 
    SUBJECT: Weekly Writing Assignment, Week 5

    The first article I selected is titled “A Survey of Mobile VPN Technologies” written by Abdullah Alshalan, Sandeep Pisharody and Dijang Huang. The journal highlights the importance of mobile VPN technology in today’s cybersecurity world. It discusses information of a survey that was shared amongst users regarding mobile VPNs solutions. The editor-in-chief of this article is Dusit Tao Niyato, who has a Ph.D. in electrical and computer engineering from the University of Manitoba, Canada. He is affiliated with IEEE Communication Surveys and Tutorials at Nanyang Technological University in Singapore. Mr. Niyato is currently a professor in the School of Computer Science and Engineering, Nanyang Technological University.

    The second article I chose is titled “All-Optical Virtual Private Network in OFDM-PON Using Microwave Photonic Filter” written by Chang-Hun Kim, Sun-Young Jung, Sang-Min Jung and Sang-Kook Han. The journal discusses a proposal of a novel all-optical VPN using a microwave photonic filter, which allows inter-communications among optical network units in an optical network system. The authors also focus on resolutions to two main problems with the proposed VPN. The editor-in-chief of this article is Jianping Yao, who has a Ph.D. in electrical engineering from the Universit´e de Toulon et du Var, France. He is affiliated with the Microwave Photonics Research Laboratory at the University of Ottawa in Canada. Mr. Yao is currently a professor and a University Research Chair with the School of Electrical Engineering and Computer Science, University of Ottawa.

  8. One of the article I chose from CUNY City Techs IEEE database is “About Cloud Computing in Amazon and Microsoft Azure platforms: performance and service comparison” it’s a summary of a comparison of cloud computing performance services in Amazon and Microsoft platforms. Cloud computing is a technology that enables the flexibility to access a wide range of system computer resources by operating independently. The main advantage of using cloud computing is that there is an initial investment in the information system. The main obstacle of cloud computing is that it is a distributed technology in the global market. The editor-in-chief is D. Armstrong, K. Djemame who is a professor in distributed systems.

    The second article I chose is from Amazon Web Services (AWS) educate. I found this on google.com and created an account. AWS Educate is a training platform from Amazon that has many courses to learn about AWS. It goes into every detail of amazon such as buckets, S3, hosts, DNS, VM, load balancing, elastic beanstock etc… It is an interactive platform showing videos, text and at the end quizzes you on your knowledge and everything learned so far. Jeff Barr is the editor-in-chief he is a VP & Chief Evangelist, AWS.

  9. TO: Prof. Ellis
    FROM: Ali Hossain
    DATE: 03/25/2021
    SUBJECT: Weekly Writing Assignment, Week 5

    For this article I chose from CUNY City Techs IEEE database is “Security in social networking services: A value focused thinking exploration in understanding user’s privacy and security concerns” is an article by BarrettMaitland, Nadine, Barclay, Corlane published in 2016 identifies various prominent themes in need of more research in the continuous growth of social networking service and cybercrime management.

    The second article I chose is from Amazon Web Services (AWS) educate. I found this on google.com and created an account. AWS Educate is a training platform from Amazon that has many courses to learn about AWS. It goes into every detail of amazon such as buckets, S3, hosts, DNS, VM, load balancing, elastic bean-stock etc… It is an interactive platform showing videos, text and at the end quizzes you on your knowledge and everything learned so far. Jeff Barr is the editor-in-chief he is a VP & Chief Evangelist, AWS.

  10. TO: Prof.Ellis
    FROM: Foysal Ahmed
    DATE:03/10/2021
    SUBJECT: Week 5 writing assignment
    I went to the city tech school library and started to do my research based on the lecture. About three different articles and three different constrictions. The first one it grabs my attention since it have a lot of useful information and something improve my logic because my reading and it’s great to learn new things I came to me to pick this article Difference between Next Generation Network and Traditional Network by jean’s Next Generation Network is internet Protocol (IP) based. Traditional Network is TDM based. It uses different control and signaling and protocols such as Internet protocol, multi Protocol Label switching etc. to support different multimedia services.

    The second article I found is called Enabling reuse-based software development of large-scale systems. Software reuse enables developers to leverage past accomplishments and facilitates significant improvement in software productivity and quality. Software reuses catalyze improvement in productivity by avoiding redevelopment and improvements in quality by incorporating components whose reliability has already been established. This software environment successfully follows principles of reuse-based software development in order to achieve an average reuse of 32 percent per project, which is the average amount of software either reused or modified from previous systems.

Leave a Reply