refer to the attached document
Paper B
The question is attached
DATA COMMUNICATIONS AND NETWORKING Paper and PowerPoint
•Topics of project : Anything that has to do with data communications and networking.
–Understand of recent development of networking topics (survey paper), 4+ pages required (including references). You can use tables to summarize existing work.
–Implementation some network related applications (need to design your own scenario, comparisons with existing work are preferred (i.e. better performance))
–Modeling and simulation of networks (need to design your own scenario, comparisons with existing work are preferred (i.e. better performance))
Uploaded a template of the paper
Also need a PowerPoint presentation on the same topic
Research Paper
Topic: Computer Networking and Machine Learning
Note: You will write a paper of at least 8-10 pages in length. The Title page, Abstract, Table of Contents, and Reference pages should not be counted in the number of pages required. in APA format
Rules:
Chapter 1- Introduction (3 – 4 pages)
Introduction
Problem Statement and Purpose of Research
Relevance and Significance
Research Questions
Barriers and Issues
Chapter 2 – Review of the Literature (6-8 pages)
Description of the research
Research Method
Findings
Conclusion
Chapter 3 – Research Methodology (3 – 4 pages)
Chapter 4: Findings, Analysis, and Summary of Results (2 – 4 pages)
The following topics are intended to serve as a guide:
- • Data analysis
- • Findings & discussion
- • Analysis
- • Summary of results & discussion
Chapter 5: Conclusions (2 – 4 pages)
Please use below research guide to follow instructions and understand the expectation in detail
Case Study Assignment
Details:
Using the Case Study document (Anti-Forensics: Techniques, Detection and Counter Measures) describing a scenario which you have been called to investigate. The case study provides an opportunity to walk through the cyber forensic investigation process. Through this exercise, prepare the investigative plan, determine tools to use to conduct the forensics analysis, and conduct a basic computer forensics investigation. See the Case Study section in the Course Content Menu for details on what is needed for this final case study.
In a Word document, address all of the assignment requirements on the last page. Remember, the audience is Brad Richards, COO. Give proper attention to wording, grammar, spelling, punctuation, etc. Make sure to cover the case in sufficient detail and answer any potential questions that may be asked. Lastly, remember to put your name on your paper as the chief investigator.
Assignment
- Select a subfield of Artificial intelligence that interests you. Find an example of current work (no more than 5 years old) on this topic and research on it. Franklin’s library is a great resource where you can find many books, papers and conference proceedings in AI.
- For what you pick, write a summary report with your answers to the following questions as best as you can:
- What is the problem being solved?
- What approach does it take to solve it?
- Is there anything unique or different or special about this approach that makes it different from other similar approaches? (There almost always is.)
- How well does it work?
- Do they talk about what they want to do next, in terms of new functionality, or new approaches?
- The paper should be 1-2 pages, and should talk about these issues in your own words. Anyone can quote Wikipedia or a section of someone’s web page. What I want to see is you distilling the information and explaining what’s going on. You must cite your sources appropriately.
Research paper abstract summary – The roles of the Network Administrators to detect malicious activity
Research paper abstract summary – The roles of the Network Administrators to detect malicious activity
Subject: Business Network Systems Management
Topic: The roles of the Network Administrators to detect malicious activity
This topic must be very specific and CAN NOT BE too broad otherwise it will be returned back.
Add brief 1 paragraph an abstract summary (600-800 words) of what you would like to say about that topic (i.e., ) and add 2-3 reference on 2nd page.
Subject book used: The Practice of System and Network Administration, Volume 1 3rd edition.
Important*****:
OLD Topic: The Roles of System Administrator on Cyber Security
Professor Note: Topic is too broad. Please narrow down the topic and resubmit (-50).
Topic is on an appropriate subject. A general discussion of what roles SAs can do on Cyber Security is much, much, much too broad to cover in 7-10 pages.
Exp19_Access_Ch4_Cap – Farm Conference 1.0
Exp19_Access_Ch4_Cap – Farm Conference 1.0
Note : Just Imports the Table, Form, Reports and Queries from this Data in your Access File Or If You can not do this Send me message
You are helping a small non-profit group organize their national farm and agriculture conference. You will create a form to organize input, a report to display the finalized schedule, and mailing labels.
Access Chapter 4 Farm Conference
Start Access. Open the downloaded Access file named Exp19_Access_Ch4_Cap_Farm.accdb. Grader has automatically added your last name to the beginning of the filename. Save the file to the location where you are storing your files.
Create a form using the Form tool based on the Presenters table. Change the title in the Form Header to Enter/Edit Presenters.
Reduce the field value control widths to approximately half their original size (to approximately 3.6″). Delete the subform.
Sort the records by LastName in ascending order. Save the form as Edit Presenters. Close the form.
Open the Location Information form in Layout view. Apply the Stacked Layout control to the form. Save and close the form.
Create a new report based on the Exhibits with Presenters query using the Report Wizard. Select all available fields, choose to view the data by Presenters, ensure that FirstName, LastName is the only grouping level, use Date as the primary sort field in ascending order, accept the default Stepped option, and change the layout to Landscape. Save the report as Presenter Schedule.
Apply the Integral theme to this report only. Save the report.
Modify the Presenter Schedule report so that the StartingTime field from the Exhibits table is added as the last field (appearing to the right of LocationID). In Design view, ensure that the left edge of the field is at the 8.5-inch mark on the ruler, and then return to Layout view.
Change the title of the Presenter Schedule report to Schedule by Presenter.
Change the sort so the StartingTime is a secondary sort field (that is, so that the first sort is Date, and the second sort is StartingTime). Save and close the report.
Create a new labels report based on the Presenters table. Use the Avery USA 8660 label template. Accept the default font options, and set the labels up so the first and last name appear on the top line, the Address on the second line, and the City, State, and ZipCode appear on the final line. Your first label should look like:
Shannon Beck
368 Graham Avenue
Graham, KY 42344
Do not add any sorting. Name the report Presenter Mailing Labels. Close the labels.
