[SOLVED] 5G Cell communication

Research Project Instructions5G5G Cell communication is gradually been adopted by telecommunications providers across the country.However, there are technical problems to overcome, including that the higher frequencies cannot evenpenetrate a pane of glass.Security alarms have been raised everywhere, from the ridiculous to the political. Do as much researchas you can on the threats of 5G and tell me about what you can find. You should be able to findeverything from hacking issues, to privacy issues, to frequency issues, to political and nation state issues,to manufacturing issues, and maybe others. What are the dangers you found and how real are each ofthem? Be sure to give sources of your researchNote:Irrespective of the option you choose, your paper must have at least 5 sources. Include in-textcitations and a reference section. The reference section does not count towards the total number ofpages. Make it double spaced with a minimum font size of 11.It’s worth noting that Wikipedia does not count as a reliable source in academic writing. Use APA or IEEEfor your citations.Some sources to consider:

Read more

[SOLVED] Approximating Distances In Networks

Name: M.Number: css1 (706.616)1. In this example you will implement the algorithm for approximating distances in networks. First, you will select ?? landmarks ?? = {??1, ??2, … ????} and then compute distances from each of these landmarks to all other nodes in the network. Using the upper bound on the distance you will approximate the distances for all pairs of nodes ?? and ?? by:?????,?? = ??????????? {???,???? + ???,???? }.To practically evaluate different strategies for selecting landmarks you will work with the network from the Les Misarables book. On the course web site you can find the network and a simple python code (https://courses.isds.tugraz.at/dhelic/websci/websci1.zip) showing you how to work with the network analysis library networxs (https://networkx.github.io/). This network has ?? = 77 nodes (76 nodes are in the giant component and you should work only with the giant component) and for each experiment you will select ?? = 10 landmarks. Implement these three strategies for landmark selection:(a) uniform random selection of landmarks, (b) random selection of landmarks proportional to the nodes degree, (c) random selection of landmarks inversely proportional to the nodes degree.To evaluate the strategies compute distances exactly for all pairs of nodes. Than compute absolute error for each pair of nodes ?? and ??:????,?? = |????,?? ? ?????,??|. Plot the histogram of absolute errors for all three strategies, together with the mean absolute error and the sample standard deviation of the error. Label the axes of your plots and provide a descriptive title for the plots. Include the mean and the standard deviation in the title of the plot. For all computations, plots, etc. you can either implement the code yourself or find an appropriate networxs function. For plotting use matplotlib and seaborn, which provides ready to use functions for various kinds of plots. In your report submit only the plots with a short discussion of what you see in the plots and which strategy worked best in your opinion. If your results are inconclusive you can repeat the selection of landmarks many times (e.g., 1000 times) and look at the averages over the landmark selections. In case of repetitions optimize your code by e.g., computing distances in a preprocessing step. You do not need to submit the code. For creating the report you can use the provided tex file to compile to PDF or create a PDF with any other tool that you like.

Read more

[SOLVED] Evaluating Emerging Technologies

Evaluating Emerging TechnologiesTechnology Evaluation Study Plan – Detailed Assignment DescriptionChoose one of the student-written Technology Selection papers from the list posted by your instructor in the Week 7 conference.Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following:· characteristics (features and capabilities) of the technology· interactions among technologies, people, environments, and processes (use cases or scenarios)· risks or vulnerabilities associated with adoption of this technology· costs and benefits associated with adoption of this technologyChoose Your Evaluation MethodYour evaluation study design must use one of the following:· Case Study· Delphi Study (panel of subject matter experts)· Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment)· Pilot Implementation (in a demonstration environment)See the Technology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods.Design Your StudyIdentify the specific questions that your formal evaluation study will address. These questions must be security-focused and should address: threats, vulnerabilities, attacks, countermeasures, risks, risk mitigations, etc. Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric).Develop Your Evaluation Study PlanUse your study design to prepare a high-level plan for your evaluation study. Your plan must include the following:· Introduction· description of the emerging technology and justification for including it in an evaluation study· Research Question(s)· These must be security focused (i.e. focused on cybersecurity objectives such as confidentiality, integrity, availability, etc.) and should address: threats, vulnerabilities, attacks, countermeasures, risks, risk mitigations, etc.· Use “how” or “what” questions (writing good “why” questions is beyond the scope of this course).· Examples· What vulnerabilities exist that could be attacked to compromise confidentiality?· How could an attacker compromise availability?· For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer).· Methods· high level design of the study (focus upon the evaluation model and your research questions)· description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated)· notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study)· Limitations or Special Considerations· any special considerations or security concerns which must be addressed (e.g. “clean room,” test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems)· Timeline of Events (Notional)· A notional timeline (expressed in days or months after start date) for your studyNotional Timeline of EventsThe notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of “rounds” and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues). For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting)

Read more

[SOLVED] Implementation File

#include using namespace std; int catalan(int n) { unsigned long int cat[n + 1]; cat[0] = cat[1] = 1; int i, j; for (i = 2; i <= n; i++) { cat[i] = 0; for (j = 0; j < i; j++) { cat[i] += cat[j] * cat[i - j - 1]; //calatlon number } } return cat[n]; } int fibonacci(int n) { if (n == 0) return 0; else if (n == 1) return 1; else return fibonacci(n - 1) + fibonacci(n - 2);//recursive calls } int main() { int option, n; do { cout << "n1. Do Catalan numbers"; cout << "n2. Do Fibonacci numbers (recursive)"; cout << "n0. Quit"; cout << "nEnter selection: "; cin >> option; switch (option) { case 1: cout << "nEnter Catalan number to calculate: "; cin >> n; cout << "nCatalan number at " << n << " is " << catalan(n); break; case 2: cout << "nEnter Fibonacci number to calculate: "; cin >> n; cout << "nFibonacci number " << n << " is " << fibonacci(n); break; case 0: break; default: cout << "nInvaid option"; break; } } while (option != 0); return 0; }

Read more

[SOLVED] Smart Phone Security Exploits

A selection of papers concerning smart phone security has been placedon eLearn in order to get you started.You should investigate exploits and security as it relates to smart phones.For example a security exploit could allow someone to use your phone as a listening device.You should investigate the following:· Basic principles and theory of smart phone security exploits.· The state of smart phone security from the past five years.· You should include the current state of smart phone security.· Your analysis of the likely future importance and effectiveness of smart phone security exploits.A mark scheme for the assignment can be found here.LEARNING OUTCOMES1. Analyse potential threats to computer systems and networks and evaluate countermeasures5. Critically evaluate security policies and techniques6. Research and report on a security-related topic, using appropriate literature

Read more

[SOLVED] The Survey Paper

Information related with the Survey paper and Presentations is given here. Survey This is an individual research. Each student will prepare a survey on the topic of their interest by reading at least 3 – 5 scientific papers and writing a short report (maximum of 5 pages including citations). Survey details In your report, give the problem/topic definition, discuss the motivation behind the studies working on this problem/topic (just try to answer the question of “why have all these studies worked on this problem? is it really important?”), and then explain the studies. While explaining the studies, do NOT list the studies and do NOT explain them one by one. Instead, understand the contribution and methodology of each study, try to group the studies according to their contributions and methodologies, and then explain/discuss the studies as groups.In your discussion, do not forget to give the give the advantages and disadvantages of each group’s approach, and discuss the similarities and differences in between the approaches followed by different groups. The format, plagiarism, structure, and writing style of your report (including writing the citations properly) will be a part of your grade.

Read more

[SOLVED] A Development Officer

You are a development officer for a state university. As an officer, you manage a portfolio of important donors who contribute financially to different areas within the university. You categorize the donors based on the college or school for which they want their donations associated. You recently downloaded the portfolio to an Excel workbook. Based on the way the data downloads from the main database, you want to format the text for readability and to make it easier for you to analyze. In addition, you will create an advanced filter to review a list of donors for a particular college or school. Finally, you want to create a look up area to look up data for a specific donor and create a summary section.2The first column displays the name of the college or school (such as ART or BUSINESS) associated with each. You want to assign a three-character code for each college and use that code to attach to existing donor IDs to create a unique field.In cell B8, insert the LEFT function to extract the first three characters from the college name in cell A8. Copy the function to the range B9:B35.3You now want to combine the college ID and donor ID.In cell D8, insert the CONCAT function to combine the college ID in cell B8 with the donor ID in cell C8 with a hyphen between the two text strings. Copy the function to the range D9:D35.4In cell J8, insert a text function that displays the college name from cell A8 with just the first letter capitalized, such as Engineering. Copy the function to the range J9:J35.5The Full Name column displays last and first names of the donors. You want to display last names only in a separate column.In cell F8, type Schneider and use Flash Fill to fill in the last names for the donors in the range F9:F35.

Read more

[SOLVED] Scheduling Processes

-How can material requirements be reduced through improved master scheduling processes?-How does forecasting impact planning and control system for reduced waste?Please ensure to write a post which is a minimum of 500 words, please ensure to provide at least two peer reviewed journal articles.

Read more

[SOLVED] Contribution and Methodology

Information related with the Survey paper and Presentations is given here. Survey This is an individual research. Each student will prepare a survey on the topic of their interest by reading at least 3 – 5 scientific papers and writing a short report (maximum of 5 pages including citations). Survey details In your report, give the problem/topic definition, discuss the motivation behind the studies working on this problem/topic (just try to answer the question of “why have all these studies worked on this problem? is it really important?”), and then explain the studies. While explaining the studies, do NOT list the studies and do NOT explain them one by one. Instead, understand the contribution and methodology of each study, try to group the studies according to their contributions and methodologies, and then explain/discuss the studies as groups.In your discussion, do not forget to give the give the advantages and disadvantages of each group’s approach, and discuss the similarities and differences in between the approaches followed by different groups. The format, plagiarism, structure, and writing style of your report (including writing the citations properly) will be a part of your grade.

Read more

[SOLVED] Data Mining Application

Data Mining Application in Health Care Management? (7 pages, not counting title and reference)

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

We now help with PROCTORED EXAM. Chat with a support agent for more details