Elliptic Curve Cryptography

 1 page discussion

  • Perform research on Elliptic Curve Cryptography. Define what  Elliptic Curve Cryptography is and identify the associated benefits and  the associated negatives.
  • Would the implementation of Elliptic Curve Cryptography be a good  option for the HU Investment Firm? Fully explain your comments.

Journal Article Review

 Critical review of the Journal Article: “Ontologies describing concepts and relations in a specific domain are necessary for knowledge representation and knowledge exchange. Waterson and Preece define ontology as “he Specification of Shared Knowledge”. Ontologies (semantic data) facilitate the usability of e-technology and realize its full power. here are several Languages, Tools and Formalisms that accompany the term ontology. Among those languages, we enumerate XML (Extensible Markup Language), RDF (Resource Description Framework), RDFS (RDF Schema), DAML+OIL and OWL that are used in several contexts (compatibility with other concepts, expressiveness, etc.). Moreover, there exist several ontology formalisms with a definite advantages and drawbacks, which support particular features. Ontologies should be created for a specific function in the most appropriate formalism satisfying needs of a fine target community.” (Slimani 2015) 

 (PDF) Ontology Development: A Comparing Study on Tools, Languages and Formalisms (researchgate.net) 

Critically review various toolsets used in the design and development of ontology for various scenarios. Document your review in maximum 800 words. You may also refer to any other research articles for more information. Proper citations and referencing must be provided in CU Harvard style. Key findings may include (but not limited to):  Introduction to ontology  Application areas  Explanation with one example

Apply the knowledge gained from the previous section and discuss the role of ontology in Web Development. Further discuss various Semantic Heterogeneity issues on Web 

Develop a Computer/Internet Security Policy

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Research Paper

 

We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

portfolio project

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

data structure and algorithm

You are requested to implement a simple IoT device management system. IoT devices

can be categorized into three main groups: consumer, enterprise, and industrial.

“Consumer connected devices include smart TVs, smart speakers, toys, wearables and

smart appliances. Smart meters, commercial security systems and smart city technologies

— such as those used to monitor traffic and weather conditions — are examples of industrial

and enterprise IoT devices. Other technologies, including smart air conditioning, smart

thermostats, smart lighting and smart security, span home, enterprise and industrial

uses.”1 An IoT device can be identified by many fields including category, Identifier, …

1- (2.5 mark) Describe the IoT data type, IoTdevice, using Java classes. Make sure

to use Java inheritance, an interface, and an abstract class.

2- (5 marks: 1mark/method) We want to implement a simple application that

manages the IoT devices. You are asked to develop a Java application that uses

an array to store all information regarding the IoT devices installed in a building and

using the newly created data type IoTdevice defined in 1). You should provide a

menu with the following options:

———————————————————————-

IoT Device Management System (CSC301, Fall2020)

———————————————————————-

1- Add a new IoT device

2- Delete all existing IoT devices given a category

3- List all existing IoT devices from one category

4- Check if an IoT devices exists based on its ID

5- Sort all IoT devices based on two criteria of your choice

0- Quit

———————————————————————-

Your choice? __

———————————————————————-

Please use the partial Java code provided with this assignment which prints the

menu. You MUST do this lab in groups of maximum two students. This Lab

counts for 7.5 marks. You should upload your work via the course website on time

before September 29th, 23:59. Any late submission will be penalized (-0.25 / day).

Evaluation: You will be evaluated based on a demo during which you will be asked

individually various questions.

CCM-3

   

Research desktop virtualization and summarize at least one  peer-reviewed scholarly article on the topic.  Provide at least two full  paragraphs as a summary.

Additionally, provide at least one more paragraph to contrast and compare Hyper-V and ESXi.

Project paper , Due date 26th September

 Provide an outline for your Chapter 2.  Also write the Introduction to the Topic of your dissertation centered on the Problem for your research. 

Based on below topics

Dissertation  Topic

1.)  Information Systems

2.)  Database

 Note: Minimum 600 words not including title and reference page. References should be taken from peer revived   

Project Computer Science

Projects 200-400 words.
  1. Using the Internet as a resource, research multiple file systems for hard disks supported in Windows, such as MS DOS’s FAT file system, the 32-bit FAT file system, and the NTFS file management system. Submit your findings in a report.
  2. Compile a list of various data-compression techniques that are commonly employed in today’s computer systems. Which of these techniques is the most efficient? That is, which of these techniques has the maximum gain in storage space with the least effect on processing time?
Additional Resources
  1. MFD-Master File Directory: http://www.boogles.com/local/papers/tcfs-thesis/subsection2_7_2_2.html
  2. Data Compression: http://www.cisco.com/c/en/us/support/docs/wan/data-compression/14156-compress-overview.html
  3. Variable-length records: http://www.ibm.com/support/knowledgecenter/SSB27U_6.2.0/com.ibm.zvm.v620.dmsa5/hcsd2c10242.htm
  4. ISAM Databases: http://www.mixsoftware.com/product/db/intro1.htm
  5. International Organization for Standardization: http://www.iso.org/iso/home.html

Machine Learning Iris

Write a program to apply Machine Learning classification models to Iris flowers dataset. Follow the steps:

1.Download the iris.csv file (example: https://gist.github.com/netj/8836201). From this file the label (target) is defined with the ‘variety’ column and the features with ‘epal.length’, ‘sepal.width’, ‘petal.length’, ‘petal.width’ columns.
2.Preprocess the iris.csv file by label encoding the target ‘variety’ column.
3.Apply the following Machine Learning classification models: K Nearest Neighbors and Random Forests
4.Calculate the following classification metrics to validate the model: Accuracy Score, Confusion Matrix and Classification Report.
5.Explain how the program works and compare these two classification models.

Make you follow all of them so you don’t lose any grade points because of that. Feel free to contact me for any questions you may have.