• Social Mining Harvester, using Twitter 

      Jové Iguina, Alberto F. (Polytechnic University of Puerto Rico, 2013)
      This article showcases phase one of a system that is able to analyze the Social Web. Here we present how to create a harvester for the Social Network Twitter. We explain the different technologies used and how to proceed ...
    • Software Program Solution for a Speech Therapy Center 

      Maldonado Santiago, Josué A. (Polytechnic University of Puerto Rico, 2022)
      Given the need for new alternatives to facilitate the operation of businesses, technological structures continue to be designed to promote the best workload flow. Many choose to find everyday common solutions available to ...
    • The Structure of a Composite Galaxy Model 

      Talavera Balbuena, Claudia E. (Polytechnic University of Puerto Rico, 2014)
      The algorithms and numerical methods describes the way of implementing a composite galaxy –bulge area, disk, and galaxy halo- which is modeled as a full three-dimensional entity, using spherical and disk models as ...
    • A Study in Wireless Attacks and its Tools 

      Flores, José J. (Polytechnic University of Puerto Rico, 2012)
      Abstract - Every day the world is becoming more connected through the use of networks, specifically wireless local area networks (WLANs). At the same time, the significance of wireless security continues to grow. Similar ...
    • A Study of Green IT Technology 

      Del Valle Caraballo, Fabián A. (Polytechnic University of Puerto Rico, 2017)
      Each year the global production and development of computer systems increases, this in turn increases the energy demand that these systems require to function. Information technology has a role to play in the ever-increasing ...
    • Teaching Basic Cryptography Concepts through the Creation of a Cryptographic Learning Tool 

      Arroyo-Serrano, Celedonio (Polytechnic University of Puerto Rico, 2014)
      Cryptography is a common technique used to assure data confidentiality and integrity. With the development of a tool designed to provide basic information and capabilities of cryptography, we can reduce the time that ...
    • Tecnología Inteligente de Minería de Datos en Telecomunicaciones 

      Berrios Negrón, Edwin J. (Polytechnic University of Puerto Rico, 2018)
      Las compañías de telecomunicaciones generan una enorme cantidad de datos. Estos incluyen; los datos de detalles de llamadas, que describe las llamadas que atraviesan las redes de telecomunicaciones, aunado a la red de datos ...
    • Using Frequency Analysis to Decrypt Monoalphabetic Ciphers 

      Rodríguez Laborde, Omar (Polytechnic University of Puerto Rico, 2015)
      Over the past few years’ technology has taken over society. Everyone uses technology. It makes everything easier, such as paying bills, buying food or any stuff that you use in your daily basis. People tend to store ...
    • Using Network Forensic Tools for Analysis and Investigation at Polytechnic University of Puerto Rico 

      Murray Ortiz, Edgar A. (Polytechnic University of Puerto Rico, 2017)
      In the world of computer security. The security of networks has become a very important field. More importantly, the tools to provide security cannot guarantee a completely secure network. Is because of that situation ...
    • Using Wireshark in a Medical Office 

      Pesquera Marrero, Luis A. (Polytechnic University of Puerto Rico, 2015)
      This project is about sniffing the packets in a secured network with electronic health record (EHR) while using Wireshark. I suspect that the packets and the network are going to be encrypted and it won’t be possible ...
    • Vulnerability Assesment of Puerto Rico’s Health Department Web Application 

      Marrero Cabrera, Alondra (Polytechnic University of Puerto Rico, 2021)
      As technology progresses in the cyber environment, so do new threats; now, with the Covid-19, pandemic biosafety and biosecurity concerns are even more rigorously scrutinized. The cyber and biological ...
    • A Web Solution to Waiting Line Problem 

      Torres Carrera, José (Polytechnic University of Puerto Rico, 2012)
      Abstract – In this article I present an approach to solve the problem of wasting time waiting in a line for product or service. A solution is presented composed of a platform API and a mobile application. The solution ...
    • What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices? 

      Sanabria Andrade, Manuel (Polytechnic University of Puerto Rico, 2012)
      Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they ...
    • Work Sampling Mobile Application 

      Martínez Lebrón, David (Polytechnic University of Puerto Rico, 2013)
      Work Sampling is a technique used to investigate the proportions of total times devoted to the various activities that constitute a job or work situation. This statistical analysis or technique constitutes a very ...
    • Working from Home and Data Protection 

      Pérez, Omar A. (Polytechnic University of Puerto Rico, 2020)
      Thanks to the pandemic the new order is working from home. When you work from the office the security of the data is responsibility of you as employee and the corporation to provide a safe network. Maybe you see it but ...
    • ZAP Proxy and OWASP Top 10 

      Ramos Flores, Eduard (Polytechnic University of Puerto Rico, 2023)
      The Zed Attack Proxy is a well-known and popular assessment tool in the cybersecurity community. The Open Web Application Security Project community offers, develops, and maintains the Zed Attack Proxy. The Open Web ...