Category: Computer Science

  • AI based student engagement analysis system in classroom

    This project presents a smart classroom system designed to improve the way student presence and participation are monitored. The system provides a more modern and efficient approach compared to traditional methods, supporting better awareness of student activity within the classroom environment.
  • Entity resolution/ python

    This Masters thesis aims to study and implement modern neural network architectures for record matching involving data that contain both structured fields (e.g., names, dates, numerical values) and semi-structured or unstructured information (e.g., descriptions, titles, excerpts, or even images).

    The proposed approach is based on designing an architecture that combines:

    • Semantic embeddings of structured fields and textual content,
    • Attention mechanisms to highlight important features, and
    • Information aggregation mechanisms for entire records.

    The methodological framework is informed by relevant literature, including:

  • IEEE journal article wiring


    Quantum-Accelerated Pattern Analysis for Signal Intelligence

    Applying quantum algorithms to pattern recognition in defense-relevant signals (e.g., radar, sonar, RF spectrum) to detect anomalies or threats more efficiently than classical methods, including quantum clustering and quantum support vector machines.

    Scope Alignment (Mandatory)

    Tell the writer:

    • The paper must focus on fundamental limits, not system implementation.
    • Core contribution must be new theorems, capacity bounds, or converse proofs.
    • Work must clearly extend classical network information theory into the quantum regime.
    • Avoid engineering optimization unless supported by new theoretical proofs.

    No simulation-only papers
    No architecture-only discussion
    No review/survey style


    2? Mathematical Depth Requirements

    Require:

    • Formal problem definition using Hilbert spaces and CPTP maps
    • Precise channel model (e.g., quantum MAC, broadcast channel, interference channel)
    • Clearly stated Theorems, Lemmas, and Corollaries
    • Complete proofs (no sketch-only arguments unless standard)
    • Converse + Achievability results if proposing capacity regions
    • Use of quantum entropy measures:
      • Von Neumann entropy
      • Coherent information
      • Holevo information

    The paper should look like classical Shannon theory but quantum.


    3? Expected Structure (TIT Standard)

    Instruct them to follow this structure:

    1. Introduction
      • Clear gap in existing quantum network literature
      • Why classical results do not directly extend
      • Summary of contributions
    2. System Model
      • Mathematical channel definitions
      • Assumptions
    3. Main Results
      • Theorem statements
      • Capacity region expressions
    4. Proof Sections
      • Achievability proof
      • Converse proof
    5. Special Cases / Extensions
      • Reduction to classical case
      • Entanglement-assisted version
    6. Discussion (Short and Technical)
      • Implications for quantum internet

    4? Novelty Requirement (Very Important)

    Tell them:

    The manuscript must contribute at least one of:

    • New quantum network capacity region
    • New outer bound tighter than existing literature
    • New coding scheme (quantum superposition coding, etc.)
    • Non-asymptotic bounds
    • Strong converse theorem

    Incremental extensions of known results will be rejected.


    5? Literature Benchmarking

    They must compare against major quantum information results and show how this work advances beyond:

    • Multi-user classical information theory
    • Known quantum Shannon theory results
    • Existing quantum MAC/broadcast papers

    Explicit comparison section required.


    6? Writing Style Requirements

    Tell them:

    • No informal explanations dominating the paper
    • No marketing language
    • No buzzwords (AI, blockchain, etc.) unless mathematically formalized
    • Clear notation table
    • Consistent symbols throughout

    7? Technical Quality Checks (Before Submission)

    Ask the writer to verify:

    All entropy identities are correct
    All inequalities are justified (data processing, strong subadditivity, etc.)
    No unproven assumptions
    All proofs logically complete
    All claims mathematically supported


    8? Formatting Compliance

    Follow IEEE TIT guidelines:

    • Two-column IEEE format
    • Proper theorem environments
    • Correct reference style
    • Page limit respected

    9? What Reviewers Will Look For

    Tell the writer the reviewers will ask:

    • Is this fundamentally new?
    • Is the math correct and non-trivial?
    • Does this generalize classical theory meaningfully?
    • Is the capacity region tight?

    If the answer to any is weak rejection likely.


    Golden Rule for Acceptance

    For IEEE Transactions on Information Theory, the paper must answer:

    “What new fundamental limit of quantum information transmission does this work establish?”

    If it cannot answer that clearly it will not be accepted.

    Requirements: 100000

  • IEEE journal article writing

    Quantum-Resilient IoT Architecture for 6G-Enabled Massive Machine-Type Communications (mMTC)

    Why #1?

    • Post-quantum security is urgent.
    • 6G + IoT convergence is a hot area.
    • Fits architecture, networking, protocols, and standards.

    Publishable angle:

    Hybrid framework integrating post-quantum cryptography + quantum key distribution + 6G IoT stack.

    Journal-Specific Requirements (MANDATORY)

    Tell them:

    • The paper must strictly align with IEEE IoT Journal scope:
      • IoT architecture
      • IoT networking protocols
      • IoT enabling technologies
      • 6G-enabled IoT systems
      • Standardization alignment
    • Not a purely theoretical quantum computing paper.
    • Not only cryptography must integrate architecture + networking + system evaluation.
    • Length: 1014 pages (IEEE double-column format).
    • Include performance evaluation (simulation mandatory).

    2. Technical Positioning (Very Important)

    Instruct them clearly:

    The paper must:

    • Propose a layered IoT architecture
    • Integrate:
      • Post-Quantum Cryptography (PQC)
      • Optional Hybrid QKD layer
      • 6G mMTC communication model
    • Show backward compatibility
    • Address scalability for massive device density

    The paper must NOT:

    • Overclaim quantum supremacy
    • Assume large-scale practical quantum internet exists
    • Be purely survey-style

    3. Required Technical Components

    Tell the writer the manuscript MUST include:

    1? Clear System Architecture Diagram

    • Device layer
    • Edge layer
    • 6G core network layer
    • Security orchestration layer
    • PQC integration points

    2? Formal Threat Model

    • Quantum adversary model
    • Shor-based public-key break risk
    • Grover-based symmetric attack implications

    3? Post-Quantum Cryptography Integration

    Must include:

    • NIST PQC candidates (e.g., lattice-based schemes)
    • Key exchange comparison
    • Computational overhead analysis

    4? 6G + mMTC Modeling

    Include:

    • Device density assumptions
    • Latency constraints
    • Energy consumption model
    • Network slicing relevance

    5? Performance Evaluation (CRITICAL FOR ACCEPTANCE)

    Must simulate and compare:

    • Classical IoT security vs PQC-based architecture
    • Latency impact
    • Throughput impact
    • Energy overhead
    • Key establishment time

    Simulation tools acceptable:

    • MATLAB
    • NS-3
    • OMNeT++
    • Python simulation framework

    No evaluation = High rejection risk.


    4. Required Sections Structure

    Tell them to follow this structure:

    1. Introduction (Motivation: Quantum threat + 6G IoT scale)
    2. Related Work (Recent 20232026 quantum-safe IoT papers)
    3. Background:
      • 6G mMTC
      • PQC
    4. System Model
    5. Proposed Architecture
    6. Security Analysis
    7. Performance Evaluation
    8. Standardization & Migration Roadmap
    9. Conclusion

    5. Standardization Alignment (Strong Reviewer Signal)

    The paper must mention alignment with:

    • IEEE
    • 3rd Generation Partnership Project
    • Internet Engineering Task Force
    • International Telecommunication Union

    Explain how migration to PQC can fit within current frameworks.


    6. What Reviewers Will Look For

    Tell the writer explicitly:

    The paper must clearly answer:

    1. What architectural gap exists today?
    2. Why is PQC integration non-trivial in mMTC?
    3. What scalability bottleneck does this solve?
    4. What measurable improvement is shown?
    5. How is this different from existing quantum-safe IoT papers?

    7. Acceptance-Boosting Elements

    Ask them to include:

    • Complexity analysis (Big-O for key exchange)
    • Comparative table with 46 recent works
    • Migration roadmap (20262035 vision)
    • Practical deployment constraints

    Critical Warning

    If outsourcing:

    • Ensure plagiarism check (Turnitin < 10%)
    • Ensure figures are original
    • Ensure simulations are reproducible
    • Ensure citations are real and verifiable
    • Avoid AI-detectable generic writing

    IEEE IoT Journal desk rejects:

    • Pure survey papers without depth
    • Overhyped quantum claims
    • No evaluation
    • Weak novelty

    Requirements: 10000

  • Writing an article for IEEE journal

    Quantum Communication via Satellites & Space Links for Global Defense Connectivity
    Architectures and challenges for space-based quantum communication including satellite QKD, entanglement distribution, and ground-space ground connectivity for secure defense communications.

    Scope Alignment Instructions (CRITICAL)

    Tell the writer:

    • The article must be communications-focused, NOT physics-heavy quantum theory.
    • Emphasize:
      • Satellite communication architectures
      • Network integration
      • Deployment challenges
      • Standards & interoperability
      • Defense communications use-cases
    • Avoid deep mathematical derivations.
    • Keep it readable for communications engineers outside quantum physics.

    If it reads like a quantum mechanics paper, it will be rejected.


    2. Required Structure (Magazine Format Tutorial Style)

    Instruct them to strictly follow this structure:

    1. Abstract (150200 words)

    • Non-technical summary
    • Clearly state relevance to satellite communications & defense networking

    2. Introduction

    • Why space-based quantum communication matters for defense (2026 context)
    • Threat of quantum attacks
    • Need for global secure connectivity

    3. Background (High-Level)

    • Satellite QKD overview
    • Entanglement distribution basics
    • Quantum repeaters (conceptual only)
    • Comparison with classical satellite encryption

    4. System Architecture Section

    • LEO/MEO/GEO satellite quantum links
    • Ground station integration
    • Hybrid classical + quantum channels
    • Defense network topology diagrams

    5. Key Technical Challenges

    • Atmospheric loss
    • Photon decoherence
    • Satellite pointing accuracy
    • Key rate limitations
    • Scalability
    • Cost and deployment barriers

    6. Defense-Specific Use Cases

    • Secure command & control (C2)
    • Tactical battlefield backhaul
    • Secure satellite-to-UAV links
    • Allied interoperability

    7. Standards & Policy

    • ITU / NATO / space governance considerations
    • Export control issues
    • PQC integration roadmap

    8. Future Directions (20262035 Outlook)

    • Quantum repeaters in space
    • Quantum internet integration
    • AI-assisted quantum link optimization

    9. Conclusion


    3. Writing Style Requirements (Very Important)

    Tell the writer:

    • Tutorial tone
    • No heavy equations
    • Use diagrams and architecture figures
    • Explain concepts simply
    • Target telecom engineers, not physicists
    • Use clear section headings
    • Include 34 conceptual figures

    IEEE Communications Magazine prefers:

    • Insightful system-level discussions
    • Industry relevance
    • Forward-looking analysis

    4. Length & Formatting

    Give these specifications:

    • 4,500 6,000 words
    • 1525 high-quality recent references (20222026)
    • At least 3 architecture diagrams
    • No more than 23 light equations (if necessary)
    • Use IEEE reference style

    5. What Will Cause Immediate Rejection

    Instruct them to avoid:

    Pure quantum physics derivations
    Simulation-only paper
    Narrow algorithm proposal
    No communications network integration
    Overly speculative claims
    Military classified tone

    Remember: It must read like a communications systems article, not a defense weapons paper.


    6. Strategic Angle to Increase Acceptance

    Ask the writer to:

    • Include a comparison table: Classical Satellite Security vs Quantum Satellite Security
    • Provide a deployment roadmap (20262035)
    • Discuss cost, scalability, and commercialization aspects
    • Add interoperability with 6G & software-defined networks (SDN)

    That systems + roadmap perspective significantly increases acceptance probability.


    7. Optional Enhancement (High Acceptance Strategy)

    Add a section titled:

    Integration of Space-Based Quantum Links with 6G Defense Networks

    This aligns with emerging communications trends and makes it more magazine-relevant.


    8. Before Submission Checklist

    Ensure:

    • Plagiarism < 10%
    • Proper citation of recent satellite quantum experiments
    • Clear industry relevance
    • Strong figures
    • Professional English editing

    Final Advice

    If written correctly, this topic fits extremely well with IEEE Communications Magazine because it:

    • Integrates communications systems
    • Addresses emerging secure networking
    • Has global infrastructure relevance
    • Is forward-looking (2026+)

    Requirements: 10000

  • Incident Response

    Hello,

    Can you go to this website and I will share the log in information, and complete these 3 labs?

    and after you submit create the screen shots and give them to me please.

    (Lab Activity1: Performing Web Vulnerability Scanning

    Lab Activity2: Assisted Lab: Using File Analysis Techniques

    Lab Activity3: Assisted Lab: Analyzing Potentially Malicious Files

    The website:

    Requirements: please pass all the labs

  • Homework 6

    Recommended Submission Format

    Below, we have provided a suggested format to help you organize your work. Youre welcome to use it or adapt it to your own style just be sure your final submission meets all the requirements in the rubric.

    For each assignment, we suggest submitting two files:

    1. Your code file – contains all your work.
    2. Your answers file walks graders through what you did and what you found. For each coding question, include:
      • Methodology functions used, models implemented, and how the model was evaluated.
      • Results equations, graphs, tables, and performance metrics
      • Discussion of Results discuss what your results mean for this dataset. Mention anything surprising, possible reasons for weak performance, ways to improve the model, other analyses worth exploring, and any ethical or legal considerations

    Requirements: Complete

  • word project The instructions is long

    follow instruction of what to do in the other word file

    Requirements: word project

  • Discussion Thread: Wireless Printing Troubleshooting

    A wireless laptop is trying to connect to a printer via a LAN. The laptop can find the printer, but cannot connect to it. How would you best troubleshoot the problem?

    Minimum 250 words

    Requirements: 250 words

  • n/a I’ll do this part

    1. Download the zipped folder linked below:
    2. Extract or unzip the folder. You should see four files inside.
    3. TIP: If you’re not sure how to extract a zipped folder, search your operating system’s help feature or refer to the
    4. in the Course Introduction.

    Step 2: Identify the Files

    1. Create a new document using Word, Google Docs, or another word processing tool of your choice. Type your name, the date, and your course information at the top of the document.
    2. In the document, list each of the four extracted files by name and identify their file type based on the file extension.
    3. Example: MyPhoto.jpg – Image File (JPG)
    4. TIP: If the file extensions are hidden, you will need to unhide, or display, them. If you’re unsure how to do this, refer to the lesson materials or do a Google search.

    Step 3: Take a Screenshot

    1. Open your File Explorer (Windows) or Finder (MAC) to view the extracted files. Make sure that your screen shows all 4 files.
    2. Take a screenshot showing the files and their extensions. Paste or insert the screenshot into your document below the list you created in Step 2.
    3. TIP: If you’re not sure how to take a screenshot, search your operating system’s help feature or refer to the
    4. in the Course Introduction.

    Step 4: Organize the Files

    1. On your desktop, create a new folder and name it: CIS101 Coursework
    2. Inside that folder, create a subfolder named: Lesson 2
    3. Move or copy the four extracted files into the Lesson 2 folder on your desktop.
    4. Take a screenshot showing your folder structure with the files inside theLesson 2 folder. Insert this second screenshot into your document.

    Step 5: Short-Answer Reflection Questions

    Answer the following short-answer questions in your document:

    1. Cloud Storage:
    • What are the benefits and potential risks of using cloud storage?
    • Do you currently use a cloud storage service (like Google Drive, OneDrive, or iCloud)? If not, which one would you consider using and why?
    1. File Organization:
    • Why is it important to keep your files and folders organized, especially when working on school or professional projects?
    1. Mac vs. PC:
    • What operating system are you using for this projectMac or Windows?
    • What do you see as the biggest difference between the two, and which do you prefer using (and why)?

    Step 6: Save and Submit

    1. Save your document inside the Lesson 2 folder using the following filename format: MEID_Lesson2_Project (Replace MEID with your actual MEID or student ID.)
    2. Zip the entire Lesson 2 folder.
    3. Submit the zipped folder using the link in .

    Submission Checklist:

    Document includes a list of the 4 files with file types

    Document includes 2 screenshots: one of extracted files, one of the organized folder

    Reflection questions are answered thoughtfully

    Document is named correctly and saved in the Lesson2 folder

    Zipped Lesson2 folder contains 4 original files and MEID_Lesson2_Project file