Computer Science
Mobile Security | Instant Homework Help
Select one of these papers on mobile, wireless, or IOT security (Links to an external site.). (Login with USF Office365 account). Provide the following: Reference of the paper (title, authors, etc.) Summary of the major research findings of the paper in your own words. Did you think the research is well-done and/or useful? Why or why not? Do you believe this research has applications to the real-world? Why or why not? What were the strengths of this paper? What were the weaknesses of this paper? Do you agree with the conclusions of the authors? Why or why not? What would be some additional research areas that could be added on to this paper? For example, if the research got the authors only to a certain point, what more needs to be done in the field of inquiry to advance our knowledge and understanding in this area? Area there any related papers/research out there? What are they? Finally, do you recommend this paper to others? Why or why not? Submit your report via this link. Your paper should be: Double spaced, one inch margins, Times New Roman 12 point. Include any cited references Length under 10 pages.
Enterprise System Implementation | Instant Homework Help
Business benefits for Enterprise system implementation Introduction About Enterprise Systems ; Examples of Enterprise System SAP, Oracle, Sales force ES implementation Best Practice, ES applications/Vendors Business Benefits i) Managing Supply Chain ii) Transformation of business iii) New strategies, Process tracking/ Control measures iv) Financial management & analysis v) Demand management, Resource management vi) Customization according to customer/business needs vii) Return of Investment Industry Level ES implementation standards Conclusion References Note : The above topic have to be covered any addition to the above is good to have please do not abstain yourself in exploring more and include the same .
Data Breach Management | Instant Homework Help
In this day and age, data breaches have increased in quantity and intensity. Therefore, it is essential that the security professional assess situations which could threaten the security of an organization’s intellectual property. Students will then gain the knowledge, tools, and resources to recognize and mitigate real time attacks. Research a data breach, ransomware, or data exfiltration attack that has occurred within the last 6 months that successfully compromised an organization. In 500-750 words, address the following: Describe in detail how the attacker made the breach. Specifically, how was the attacker able to get in and out of the system? What was the threat vector? Explain what the attacker did during the breach. Describe the effects of the attack on the various stakeholders. Be sure to include non-technical elements of the entire corporation (e.g., public relations, marketing, and/or sales). Prepare this assignment according to the guidelines found in the APA Style Guide 6th ed
Computer Literacy Microsoft Word | Instant Homework Help
Now that you have been introduced to some advanced features in Microsoft Word, you will teach the class an advanced skill in it. In this discussion, select at least one advanced feature of Microsoft Word and, using your own words (no copying and pasting) and examples, teach your classmates this skill. Check the posts on the discussion board to choose something no one else has shared yet! Summarize what this is used to accomplish and explain the steps to accomplish it. Share where you found this in the course external resource sections, online lectures, or supplemental materials, so others can review it and be specific about where you learned this. Attach a Word document demonstrating the skill you selected. Name the document you share W2D_LastName. Format your document in APA format using the skills you are learning in Week 2. Remember that in the lecture on Creating an APA Title Page, we provided a sample Word document in APA format that you can customize, including the references section. Also, the lecture on Creating an APA References Page contains supplemental materials on how to create AP citations and references. Share any challenges you had while demonstrating these techniques or any tips for others. Were there any tools or functions in Microsoft Word that you werent able to figure out or want to know more about? Share them and perhaps someone else can help.
Project Description | Instant Homework Help
You will be expected to execute a short research study on one of three areas that were listed as part of project description. They were intended to be separate research topics. In the end I am looking for a report that will document your research activity that will be done in the format we use for Final Technical Reports. 1. What are the technical challenges for implementing Machine Learning in Size, Weight and Power constrained systems like a smartphone? The desire is to provide computationally and power efficient processing at the edge. Format: ANSIS technical report
Excel Project Instructions | Instant Homework Help
using excel Project Instructions: The project consists of 4 problems and a summary set of questions. For each problem, tom hints and theoretical background is provided. In the following set of problems, r is the standard uniform random value (a continuous random value between 0 and 1). Problem 1 Generate 1000 random values r. For each r generated, calculate the random value ???? by: ???? = ?????????(????), where Ln is the natural logarithm function. Investigate the probability distribution of X by doing the following: 1. Create a relative frequency histogram of X. 2. Select a probability distribution that, in your judgement, is the best fit for X. 3. Support your assertion above by creating a probability plot for X. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background A popular method for generating random values according to a certain probability distribution is to use the inverse transform method. In this method, the cumulative function of the distribution (F(x)) is used for such a random number generation. More specifically, a standard uniform random value r is generated first. Most software environments are capable of generating such a value. In Excel and R, functions =RAND() and runif() generate such a value respectively. After r has been created, it then replaces F(x) in the expression of the cumulative function and the resulting equation is solved for the variable x. For example, suppose we wish to generate a random value according to the exponential distribution with a certain mean (say ?). The cumulative function for the exponential distribution is: ????(????) = ???? ? ???? ? ???? ???? ???? (The quantity 1/? in the above description is called the rate of the exponential random variable and is denoted by ?.) Therefore, to generate a random value x that belongs to the exponential distribution with a mean of ?. We first generate a standard uniform value r, then replace F(x) by r in the above expression, and solve the resulting equation for the variable x: ???? = ???? ? ???? ? ???? ???? ???? ???? ? ???? ???? ???? = ???? ? ???? ? ???? ???? ???? = ????????(???? ? ????) ???? = ????? ????????(???? ? ????) The formula above means that if R is a standard uniform random variable, then the random variable X obtained by the expression ???? = ????? ????????(???? ? ????) will belong to the exponential distribution with an average which is equal to the value of ?. This formula can be simplified as: ???? = ????? ????????(????) (Note that If R is a standard uniform random variable, then (1 ? ????) is also standard uniform.) A special case of the above formula is when ???? = ????. This means that a random variable x generated by the formula ???? = ?????????(????)is an exponential random variable with an average of 1 (or, rate=1). Problem 2 Generate three sets of standard uniform random values, ????????, ????????and ????????, each consisting of 10,000 values. Next, calculate the random value x according to the following formula: ???? = ?????????(????????????????????????). Investigate the probability distribution of X by doing the following: 1. Create a relative frequency histogram of X. 2. Select a probability distribution that, in your judgement, is the best fit for X. 3. Support your assertion above by creating a probability plot for X. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background: This problem is related to a theorem in the probability theory. The theorem states that: If ????????, ????????, , ????????are n identical and independent exponential random variables each with a mean of ?, then the random variable obtained by their sum, that is ???????? + ???????? + + ????????, will have a ????????????????????(????, ????) probability distribution, where n is the shape parameter of the Gamma distribution and ???? = ???? ???????????????? . From the Hints and Theoretical Background of Problem 1, we know that if R is a standard uniform random variable, then ???? = ?????????(????) is an exponential random variable with an average of 1. Therefore, if ???????? , ????????, and ???????? are three independent standard uniform random variables, then ???????? = ?????????(????????)) , ???????? = ?????????(????????), and ???????? = ?????????(????????)are three independent and identical (each with a mean of 1) exponential random variables. Thus, according to the theorem above, the random variable formed by their sum, that is ??????????(????????)? + ??????????(????????)? + (?????????(????????)), will belong to the ????????????????????(????, ????)probability distribution. However algebraically, ??????????(????????)? + ??????????(????????)? + ??????????(????????)? = ??????????(????????) + ????????(????????) + ????????(????????)? = ?????????( ????????????????????????). Therefore, if ???????? , ????????, and ???????? are three independent standard uniform random variables between zero and 1, then the random variable X formed by the formula ???? = ?????????( ????????????????????????) will belong to the ????????????????????(????, ????) probability distribution. Problem 3 Generate a set of 1000 pairs of standard uniform random values ????????and ????????. Then perform the following algorithm for each of these 1000 pairs: Let the output of this algorithm be denoted by Y. Step 1: Generate random values ???????? = ?????????(????????) and ???????? = ?????????(????????) Step 2: Calculate ???? = (?????????????)???? ???? . If ???????? ? ????, then generate a random number ????. If ???? > ????. ???? accept ????????as ????(that is, let ???? = ????????); otherwise if ???? ? ????. ????, else accept ????????? as ???? (that is, let ???? = ?????????). If ???????? < ????, no result is obtained, and the algorithm returns to step 1. This means that the algorithm skips the pair ???????? and ???????? for which ???????? < ???? without generating any result and moves to the next pair ???????? and????????. After repeating the above algorithm 1000 times, a number N of the Y values will be generated. Obviously ???? ? ????????, ???????????? since there will be instances when a pair ???????? and ???????? would not generate any result, and consequently that pair would be wasted. Investigate the probability distribution of ???? by doing the following: 1. Create a relative frequency histogram of ????. 2. Select a probability distribution that, in your judgement, is the best fit for ????. 3. Support your assertion above by creating a probability plot for ????. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background Other than the inverse transform method used for generating random values that are according to a certain particular probability distribution, a second applied method for generating random values is the Rejection algorithm. The details of this algorithm are explained below: Suppose we wish to generate random values x that is according to a certain probability distribution with ????(????)as its probability density function (pdf). Also suppose that the following two conditions are satisfied (i) we are able to generate random values y that belong to a probability distribution whose probability density function is ????(????), (ii) there exists a positive constant C such that ????(????) ????(????) ? ???? for all y values (this means that the ratio (????(????) ????(????) ) is always bounded and does not grow indefinitely. This condition is almost always satisfied for any two probability density functions ????(????) and ????(????)). The rejection algorithm can now be implemented as follows: Step 1: Generate a random value y that belongs to the probability distribution with ????(????) as its pdf and generate a standard uniform random value r. Step 2: Evaluate ???? = ????(????) ???? ????(????) . If ???? ? ????, then accept y as the random variable x (that is, let ???? = ????); otherwise return to Step1 and try another pair of (???? , ????) values. A few remarks about the Rejection algorithm is worth noting: 1. The probability that the generated y value will be accepted as x, is: ????(????) ???? ????(????) . This is the reason why the algorithm uses a standard uniform value r and accepts y as x if ???? ? ????(????) ???? ????(????) . 2. Each iteration of the algorithm will independently result in an accepted value with a probability equal to: ???? ????? ? ????(????) ???? ????(????) ? = ???? ???? . Therefore, the number of iterations needed to generate one accepted y value follows a geometric probability distribution with mean C. Relevancy of Problem 3 to the Rejection Algorithms: In problem 3, the random variable y , selected from an exponential probability distribution with rate =1 and a pdf of ????(????) = ?????????, is used to first generate the absolute value of a standard normal random variable x (|????|has the pdf: ????(????) = ???? ????????? ????????????? ???? ), and then assign positive or negative signs to this value (through a standard uniform variable r) in order to obtain a standard normal random value. It can be shown algebraically that ????(????) ????(????) = ????????? ???? ???? ? (?????????)???? ???? ? ????????? ???? for all y values (note that ???? ?(?????????)???? ???? ? ???? for all y values). Therefore, the constant C in the assumptions of the algorithm can be chosen to be: ???? = ????????? ???? ? ????. ????????????. Therefore, ????(????) ???? ????(????) = ???? ? (?????????)???? ???? . Hence the following algorithm can be used to generate the absolute value of a standard normal random variable: Step 1: Generate random variables Y and R; with Y being exponential with ????ate=1, and R being uniform on (????, ????) Step 2: If ???? ? ???? ? (?????????)???? ???? , then accept Y as the random variable X (that is, set ???? = ????); otherwise return to Step1 and try another pair of (???? ,????) values. Note that in step 2 of the above algorithm, the condition ???? ? ???? ? (?????????)???? ???? is mathematically equivalent to: ?????????(????) ? (?????????)???? ???? . However, we have already seen in the Hints and Theoretical Backgrounds of the earlier problems that if R is standard uniform, then ?????????(????) is exponential with rate=1. Therefore, the algorithm for generating the absolute value of the standard normal random variable can be modified as follows: Step 1: Generate independent exponential random variables ???????? and ????????; each with ????ate=1. Step 2: Evaluate ???? = (?????????????)???? ???? 2. If ???? ? ????????, then accept ???????? as the random variable X (that is, set ???? = ????????); otherwise return to Step1 and try another pair of (???????? , ????????) values. In fact, it is the above version of the Rejection algorithm that is being implemented in Problem 3. However, in order to obtain a standard normal random value (instead of its absolute value), the step 2 of the above algorithm has been modified as follows: Step 2: Evaluate ???? = (?????????????)???? ???? . If ???? ? ????????, then generate a standard uniform variable R. If ???? ? ????. ????, set ???? = ????????, otherwise set ???? = ?????????. If ???? > ????????, return to step 1 and try another pair of (???????? , ????????) values Note: The standard normal random value generated by the Rejection algorithm can be used to generate any normal random value with a mean ? and a standard deviation ?. Once a standard normal variable Z has been generated, it suffices to evaluate ???? + ???????? to generate the desired normal variable. Problem 4 In the algorithm of problem #3 above, there are instances when the generated random values do not satisfy the condition ???????? ? ???? In order to obtain an acceptable value for ????. In such cases, the algorithm returns to step 1 and generates another two values to check for acceptance. Let ???? be the number of iterations needed to generate ???? of the accepted ???? values (???? ? ????). Let ???? = ???? ???? . (For example, suppose that the algorithm has produced 700 ???? values (???? = ????????????) after 1000 iterations (???? = ????????????????). Then ???? = ???????????????? ???????????? = ????. ????????. This means that it takes the algorithm 1.43 iterations to produce one output. In fact, ???? itself is a random variable. Theoretically, ????(????) – the expected value (i.e., average) of ???? of an algorithm is a measure of efficiency of that algorithm.) Investigate ???? by the following sequence of exploratory data analytic methods: 1. Estimate the expected value and the standard deviation of ????. 2. Select a probability distribution that, in your judgement, is the best fit for ????. 3. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 4. As the number of iterations ???? becomes larger, the values ???? will approach a certain limiting value. Investigate this limiting value of ???? by completing the following table and plotting ???? versus ????. What value do you propose for the limiting value that ???? approaches to? M W 10 20 30 40 50 60 70 80 90 100 200 300 400 500 600 700 800 900 1000 5. In the word document, communicate to the reader your findings about ????. 6. In the word document, explain what you have learned from this experiment. Summary In the word document, summarize and conceptualize your findings in parts 1 4 above by filling the blanks in the sentences below: 1. If ???? is a standard uniform random variable, then ?????????(????) has the ___________________ probability distribution. 2. The sum of three independent and identically distributed _________________ random variables has the ________________________ probability distribution. 3. The output of the algorithm of problem 3 has a ______________________ probability distribution. 4. In step 2 of the algorithm of problem 3, random variables ???????? and ???????? , each of whose probability distribution is ________________________ are used to generate a random value ???? that has the _______________________probability distribution. 5. The random value ???? that was discussed in problem 4, has the ____________________________ probability distribution. The expected value of ???? is: __________.
An Epidemic Feedback Model | Instant Homework Help
Curtailing virus propagation of a search engine in social networks. Question: What will be the impact of virus propagation wormhole of a search engine in social networks like Facebook and Instagram? Attach is a summary of my proposal containing my research topic and question, the value and justification. Also attached is the guide to this proposal and should be followed strictly, there is also a similar material in pdf format that is attached to also help the writer aside the additional resources he or she will be using for this writing. Please note that only those with Cyber Security and computing expertise are to work on this paper.
Physical Security Plan Presentation | Instant Homework Help
Presenting a Physical Security Plan. Your team represents a small tech firm and you are tasked with making your firms proposal to a local _____________________ firm regarding their network policies and procedures. Your proposal will be presented in the form of a PowerPoint presentation (20 slides) The presentation must include: Title Slide with details about the company that you are presenting to on the Notes Pages of the Title slide “About Us” slide about your company (Company name/logo, etc) Our Proposal/Our Goal Results of your imaginary Needs Assessment of the company) Policies & Procedures recommended Give details/specifics: Physical Security: switch to keyless entry and badges Areas to include: Design Asset management Security including policies Risk management Bibliography Slide (list minimum of 2 sources)
Web Application Architecture | Instant Homework Help
Write a paper discussing a standard three-tier web application architecture (web, application, and storage/database).Apply APA Edition 6 formatting.Use at least three properly documented references (do NOT use wikis).Correctly cite your references using APA Edition 6 formatting.Your paper should be at least 500 words in length using good grammar.Use complete sentences and paragraphs. Do not use bullets.Be sure and use a spelling and grammar checker.There is a APA Word template with default font and spacing.Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.
Cryptography | Instant Homework Help
Use the library and other internet resources to research for information about the history of Cryptography. Write a 3 pages research paper answering these questions.If you were setting up an encryption-based network, what key size would you choose and why? Explain your answer with examples. How can we apply that security protocol in real life situations?Provide at least two references to support your initial post.Please note:Apply APA format on your academic writings.provide 3 pages long (not including title and references) as a word document.Include title page, table of content page.Use time new roman or Arial as font type.Use 12 a font size.Use double spaces.Add running head to the upper left corner of your document.Add page numbers to the upper right corner of your document.Add a references page to the end of your document.Do not re-state the questions.Make you own titles and subtitles.Include at least two sources (i.e. two references) and use them within your in-text citation.Do not use Wikipedia as a reference.
Use Promo Code: FIRST15