Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

MS Powerpoint

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type

Articles 331 - 360 of 827

Full-Text Articles in Physical Sciences and Mathematics

Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "11: Identity & Access Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "18-19: Anatomy of a Breach" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "12: Network & Endpoint Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Field Relations, Geochemistry, And Geochronology Of The Rocks At Perkins Point, Castine, Maine, Robert Knowles, Douglas Reusch Apr 2020

Field Relations, Geochemistry, And Geochronology Of The Rocks At Perkins Point, Castine, Maine, Robert Knowles, Douglas Reusch

Individual Projects

Northwest of Castine, Maine is the coastline known as Perkins Point, which is home to about 500 meters of bedrock exposure. Previous mapping projects of Penobscot Bay indicate a discrepancy in rock type for this area, and therefore the origin of the rocks is unclear. Preliminary observations suggest that these rocks are mostly volcanic. The goal of this project is to determine the field relations, geochronology, and geochemistry to conclude the true nature of these rocks and ultimately create a geological map.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Wilson Sensor Footballs: Consistency Metric, Kenneth Eaton Apr 2020

Wilson Sensor Footballs: Consistency Metric, Kenneth Eaton

Honors Capstone Enhancement Presentations

No abstract provided.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton Mar 2020

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

UNO Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …


Characterization Of Dimerization Domains On The Mannose-6-Phosphate/Insulin-Like Growth Factor 2 Receptor, Tyler Degener Mar 2020

Characterization Of Dimerization Domains On The Mannose-6-Phosphate/Insulin-Like Growth Factor 2 Receptor, Tyler Degener

UNO Student Research and Creative Activity Fair

The mannose-6-phosphate/insulin-like growth factor 2 (M6P/IGF2) receptor is a transmembrane protein with the ability to sequester growth factors from the extracellular matrix. This behavior links the receptor to tumor suppression. On a structural level, the extracellular portion of the protein is segmented into 15 homologous repeats, which can be divided further into 5 triplet domains, labelled 1-3, 4-6, 7-9, 10-12, and 13-15. Each triplet receptor displays its own unique ligand binding affinity, including the ability to form dimers with triplets on a second M6P/IGF2 receptor. In fact, previous studies indicate that this protein functions optimally when dimerized. Thus, the purpose …


Design, Construction, And Characterization Of A Low-Cost Spectrometer With Interchangeable Parts, Jack Godek Mar 2020

Design, Construction, And Characterization Of A Low-Cost Spectrometer With Interchangeable Parts, Jack Godek

UNO Student Research and Creative Activity Fair

A low-cost spectrometer was designed for the purpose of teaching spectroscopy. The spectrometer can be built by the student and contains interchangeable pieces such as slit width, grating, and lenses. This will allow the student to understand how changing these variables effects resolution. The spectrometer was constructed from PVC pipe, a plastic electrical box, and a USB webcam. The actual resolution of the spectrometer is close to the theoretical value, depending on which lens and grating is used. In addition, an extra piece can be added that allows absorption spectra to be collected. Having the student piece together the spectrometer …


What Is The Most Threatening Disaster To The Continental United States?, Aaron Spomer, Elijah Kaufman, Julisa Prieto-Garcia, Brooke Aschwanden Mar 2020

What Is The Most Threatening Disaster To The Continental United States?, Aaron Spomer, Elijah Kaufman, Julisa Prieto-Garcia, Brooke Aschwanden

UNO Student Research and Creative Activity Fair

Our goal for our project is to fully understand which natural disaster is the most destructive to the United States. We have chosen to compare hurricanes, floods, tornadoes, wildfires, earthquakes, and nor’easters. We have researched the cost of the total damage and repair, how the warning systems have improved over time, the death tolls from each, and also the frequency at which each one occurs. Each group member will research a different disaster impact, and the data will create a comprehensive view of the level of devastation each disaster has. We collected data all the way from the early 1900s …


A Writing Intensive Upper Division Astrophysics/Planetary Science Course, Laura M. Woodney Feb 2020

A Writing Intensive Upper Division Astrophysics/Planetary Science Course, Laura M. Woodney

Q2S Enhancing Pedagogy

This poster describes the major writing components of an upper division Astronomy or Planetary Science course. These components are intended to be integrated throughout the semester along with the content of the course. The papers the instructor chooses for the scaffolded assignments should compliment/enhance the content the students are learning in the course. This project used the "Backwards Design" method from Bean (2011, citation in poster): where the instructor first identifies the final project, determines what challenges the students will encounter attempting to do that project, and then builds scaffolded assignments intended to address each of these challenges. This presentation …


Everyone Loves Gummi Bears! Removing The Intimidation Factor From Research Data Management With Yummy Fun., Dawn N. Cannon-Rech, Jeffrey M. Mortimore Feb 2020

Everyone Loves Gummi Bears! Removing The Intimidation Factor From Research Data Management With Yummy Fun., Dawn N. Cannon-Rech, Jeffrey M. Mortimore

Georgia International Conference on Information Literacy

How do you get students excited about research data management and attract over 70 participants to a voluntary workshop? How do you get Librarians excited about teaching a research data management workshop to undergraduates? With the promise of Gummi Bears and hands-on fun! During this workshop session, presenters will break down their experience overhauling a faculty workshop into an active learning session to expose students of all experience levels to basic research data management concepts and techniques. Presenters will walk participants through their design process from inception to delivery, highlighting how Gummi Bears lessened students’ intimidation with this complex topic …


Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage Jan 2020

Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage

Sustainability Conference

Water security is an imperative part of high-functioning societies. Currently, large populations of the globe live in water-impoverished or water-stressed areas. With climate change and growing global populations, projections show more people being impacted by issues of water shortage.

One solution to water security is the implementation of desalination, specifically with reverse osmosis systems. This presentation walks through the history, capabilities, future work, and explanations on how reverse osmosis systems work. With continued research on improving desalination, communities in both developed and developing nations around the world can work towards total water security.


Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis Jan 2020

Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis

Sustainability Conference

Humanity will soon overshoot a safe level of atmospheric CO2, if it hasn't done so already. Countries, industries, and the global economy need to dramatically and quickly alter their behavior and technology to avoid this dangerous overshoot, yet this appears unlikely. Direct Air Capture of CO2 represents an insurance policy for society - a way of removing excess atmospheric CO2. I will present an approach to this problem based on thermal physics that cools cubic kilometers of air to extract CO2 as it sublimates. I propose a combination of an efficient heat exchanger, radiative cooling, and refrigeration, all at industrial …


Public Interest Technology: Coding For The Public Good, Devorah Kletenik Jan 2020

Public Interest Technology: Coding For The Public Good, Devorah Kletenik

Open Educational Resources

These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.


Accessibility: The Whys And The Hows, Devorah Kletenik Jan 2020

Accessibility: The Whys And The Hows, Devorah Kletenik

Open Educational Resources

This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.


Historical Milestones In Astronomy: As Shown Through The Byu Special Collections Archives, Dan Broadbent Jan 2020

Historical Milestones In Astronomy: As Shown Through The Byu Special Collections Archives, Dan Broadbent

Faculty Publications

Science Research: The “Long Conversation”

  • Ideas in science can take a long time to develop.
  • How do they develop?
  • These books document a part of a conversation that began 447 years ago and spanned a 153 year period… documenting:
  • how the overall nature of the universe was worked out,
  • the establishment of the scientific method, and the boundaries of religious authority,
  • and culminated in Isaac Newton’s book that presented his three laws of motion that allow us to explore the universe to this day.


Security Camera Using Raspberry Pi, Tejendra Khatri Jan 2020

Security Camera Using Raspberry Pi, Tejendra Khatri

Student Academic Conference

Making a security camera using raspberry pi utilizing OpenCV for facial recognition, upper body recognition or full-body recognition


Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner Jan 2020

Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner

Capstone Showcase

The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …


The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto Dec 2019

The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto

Publications and Research

One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.


An Application Of The Ising Model, Juliano A. Everett Dec 2019

An Application Of The Ising Model, Juliano A. Everett

Publications and Research

Understanding how the Ising model works,what it represents, and how it can be applied to neurology. Given that an Ising model is an Entropy model that could be representative of the firing of neurons, some assumptions of the system are made and then the process is simulated through Monte Carlo methods.


Seminole State College Cure Research Program: From The Classroom To Collaboration, Maya Patrice Byfield Phd Oct 2019

Seminole State College Cure Research Program: From The Classroom To Collaboration, Maya Patrice Byfield Phd

Florida Statewide Symposium: Best Practices in Undergraduate Research

It is believed that if students are taught inductively in their first 2 years, it could induce many of them to seek research experiences later in their academic careers. To do this, we initiated an effort to promote engagement in research topics and faculty development. First, collaboration between one faculty member at SSC and a Principal Investigator at the Sanford-Burnham Institute was developed. This collaboration resulted in the creation of several internships at the Institute for students in the newly developed STEM research class. Second, to increase student engagement, the biology department developed a research focused colloquium series. Each fall …


Galaxy And Mass Assembly: A Comparison Between Galaxy-Galaxy Lens Searches In Kids/Gama, Shawn Knabel, Benne Holwerda Oct 2019

Galaxy And Mass Assembly: A Comparison Between Galaxy-Galaxy Lens Searches In Kids/Gama, Shawn Knabel, Benne Holwerda

Posters-at-the-Capitol

Strong gravitational lenses are cases where a distant background galaxy is located directly behind a massive foreground galaxy, whose gravity causes the light from the background galaxy to bend around the foreground galaxy. In addition to being visually stunning, these rare events are useful laboratories for furthering our understanding of gravity and cosmology and to determine properties, such as the mass and dark matter content, of the lensing galaxies themselves. The trouble is finding enough of these strong gravitational lenses for further study. The immensity of the catalogs being collected by state-of-the-art telescopes requires equally innovative methods for interpreting that …


The Effects Of Erosion Structures On Triplett Creek From The Fall Of 2016, 2017, And 2018, Haylee Winters Oct 2019

The Effects Of Erosion Structures On Triplett Creek From The Fall Of 2016, 2017, And 2018, Haylee Winters

Posters-at-the-Capitol

Triplett Creek is a tributary of the Licking River. It runs through Morehead, KY, where we are conducting our research.

The creek was modified in the 1970s but construction was halted before the project was complete. Unfortunately, the result was an increase in overflow and subsequent riverbank erosion. The city installed sediment trap rocks in hopes of slowing down the water and decreasing erosion. We are using drones and photogrammetric software to map the area and compare images of the river to determine erosion rates. The new images will be compared to ones taken in previous years to visualize the …


Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook Oct 2019

Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook

Eric A. Kowalik

Learn how a team collaborated to develop a text mining process for 7,500 journal articles and 500+ keywords to determine how often, when, and in what context specific terms were used. We share our processes obtaining journal permissions, data conversion, and code writing, which you can replicate to assist researchers.


Seeing With A Climate Lens, Jane Ganion Oct 2019

Seeing With A Climate Lens, Jane Ganion

Year on Climate Change: Events

Join Jana Ganion from the Blue Lake Rancheria and Kit Batten, an independent climate change consultant previously at Pacific Gas & Electric to talk about a zero-emission future and your role in it. We will discuss insights and lessons learned from the clean energy and sustainability field through our work to shape a grid of the future. If you don’t yet know exactly what you want to do or you are have been working in these fields for decades, join us to talk about sustainability, electrical grids, climate, international diplomacy, the future, and you.


Opening Of An Epoxide Ring Using Azide To Form A Triazole, Emily Hufnagel, Jeffrey A. Hansen Oct 2019

Opening Of An Epoxide Ring Using Azide To Form A Triazole, Emily Hufnagel, Jeffrey A. Hansen

Annual Student Research Poster Session

No abstract provided.