Browsing Computer Science by Title
Now showing items 94-112 of 112
-
Signadocs: A Better Way to Manage Documents
(Polytechnic University of Puerto Rico, 2021)Signadocs is an online web application with the intent of providing an efficient way of managing documents digitally and keeping track of their status. By using digital signatures and keeping track of a document status it ... -
Sistema de administración de propiedades
(Polytechnic University of Puerto Rico, 2018)Como empleado de una compañía dedicada a administrar y reposeer propiedades, surge la inquietud de crear un sistema con una base de datos que almacene la cartera de propiedades con las diferentes situaciones que ... -
SmartShop: A Merchandise Order and Deliver Application using Mobile Devices
(Polytechnic University of Puerto Rico, 2017)In our modern society, time management is very crucial. We spend most of our time on important events in which sometimes we put aside necessities such a going to the supermarket for our nutrition or pharmacy for ... -
Social Mining Harvester, using Twitter
(Polytechnic University of Puerto Rico, 2013)This article showcases phase one of a system that is able to analyze the Social Web. Here we present how to create a harvester for the Social Network Twitter. We explain the different technologies used and how to proceed ... -
Software Program Solution for a Speech Therapy Center
(Polytechnic University of Puerto Rico, 2022)Given the need for new alternatives to facilitate the operation of businesses, technological structures continue to be designed to promote the best workload flow. Many choose to find everyday common solutions available to ... -
The Structure of a Composite Galaxy Model
(Polytechnic University of Puerto Rico, 2014)The algorithms and numerical methods describes the way of implementing a composite galaxy –bulge area, disk, and galaxy halo- which is modeled as a full three-dimensional entity, using spherical and disk models as ... -
A Study in Wireless Attacks and its Tools
(Polytechnic University of Puerto Rico, 2012)Abstract - Every day the world is becoming more connected through the use of networks, specifically wireless local area networks (WLANs). At the same time, the significance of wireless security continues to grow. Similar ... -
A Study of Green IT Technology
(Polytechnic University of Puerto Rico, 2017)Each year the global production and development of computer systems increases, this in turn increases the energy demand that these systems require to function. Information technology has a role to play in the ever-increasing ... -
Teaching Basic Cryptography Concepts through the Creation of a Cryptographic Learning Tool
(Polytechnic University of Puerto Rico, 2014)Cryptography is a common technique used to assure data confidentiality and integrity. With the development of a tool designed to provide basic information and capabilities of cryptography, we can reduce the time that ... -
Tecnología Inteligente de Minería de Datos en Telecomunicaciones
(Polytechnic University of Puerto Rico, 2018)Las compañías de telecomunicaciones generan una enorme cantidad de datos. Estos incluyen; los datos de detalles de llamadas, que describe las llamadas que atraviesan las redes de telecomunicaciones, aunado a la red de datos ... -
Using Frequency Analysis to Decrypt Monoalphabetic Ciphers
(Polytechnic University of Puerto Rico, 2015)Over the past few years’ technology has taken over society. Everyone uses technology. It makes everything easier, such as paying bills, buying food or any stuff that you use in your daily basis. People tend to store ... -
Using Network Forensic Tools for Analysis and Investigation at Polytechnic University of Puerto Rico
(Polytechnic University of Puerto Rico, 2017)In the world of computer security. The security of networks has become a very important field. More importantly, the tools to provide security cannot guarantee a completely secure network. Is because of that situation ... -
Using Wireshark in a Medical Office
(Polytechnic University of Puerto Rico, 2015)This project is about sniffing the packets in a secured network with electronic health record (EHR) while using Wireshark. I suspect that the packets and the network are going to be encrypted and it won’t be possible ... -
Vulnerability Assesment of Puerto Rico’s Health Department Web Application
(Polytechnic University of Puerto Rico, 2021)As technology progresses in the cyber environment, so do new threats; now, with the Covid-19, pandemic biosafety and biosecurity concerns are even more rigorously scrutinized. The cyber and biological ... -
A Web Solution to Waiting Line Problem
(Polytechnic University of Puerto Rico, 2012)Abstract – In this article I present an approach to solve the problem of wasting time waiting in a line for product or service. A solution is presented composed of a platform API and a mobile application. The solution ... -
What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices?
(Polytechnic University of Puerto Rico, 2012)Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they ... -
Work Sampling Mobile Application
(Polytechnic University of Puerto Rico, 2013)Work Sampling is a technique used to investigate the proportions of total times devoted to the various activities that constitute a job or work situation. This statistical analysis or technique constitutes a very ... -
Working from Home and Data Protection
(Polytechnic University of Puerto Rico, 2020)Thanks to the pandemic the new order is working from home. When you work from the office the security of the data is responsibility of you as employee and the corporation to provide a safe network. Maybe you see it but ... -
ZAP Proxy and OWASP Top 10
(Polytechnic University of Puerto Rico, 2023)The Zed Attack Proxy is a well-known and popular assessment tool in the cybersecurity community. The Open Web Application Security Project community offers, develops, and maintains the Zed Attack Proxy. The Open Web ...