Hi there, I am looking for someone who is able to complete a computer science dissertation at a university level. A lot of the work has been done but the dissertation right now has a lot of ai generated content. The main things I am looking for is someone who is able to understand code (all of the coding for this project has already been done – I can share the files), edit the report and fix it (format, ai generated content, references, implement evidence from code and link it in the report, proofread etc.).
Category: Computer Science
-
word project The instructions is long
follow instruction of what to do in the other word file
Requirements: word project
-
word project The instructions is long
follow instruction of what to do in the other word file
Requirements: word project
-
Incident Response
Hello,
Can you go to this website and I will share the log in information, and complete this lab?
and after you submit create the screen shots and give them to me please.
(Lab Activity: Performing Web Vulnerability Scanning
The website:
Requirements: you need to pass
-
Incident Response
Obfuscation is frequently used to mask something important, like a URL. URL syntax is unique and often used when searching for suspicious sites and activity. By masking URLs, attackers can avoid detection, confuse users, and generate hidden functionality within payloads. Research some examples of obfuscation techniques. Why is Metasploit Framework (MSF) used by attackers?
The primary response must be at least 300 words in length and fully address the topic, demonstrating critical thinking and understanding.
Requirements: No AI use
-
IEEE journal article wiring
Quantum-Accelerated Pattern Analysis for Signal Intelligence
Applying quantum algorithms to pattern recognition in defense-relevant signals (e.g., radar, sonar, RF spectrum) to detect anomalies or threats more efficiently than classical methods, including quantum clustering and quantum support vector machines.Scope Alignment (Mandatory)
Tell the writer:
- The paper must focus on fundamental limits, not system implementation.
- Core contribution must be new theorems, capacity bounds, or converse proofs.
- Work must clearly extend classical network information theory into the quantum regime.
- Avoid engineering optimization unless supported by new theoretical proofs.
No simulation-only papers
No architecture-only discussion
No review/survey style
2? Mathematical Depth Requirements
Require:
- Formal problem definition using Hilbert spaces and CPTP maps
- Precise channel model (e.g., quantum MAC, broadcast channel, interference channel)
- Clearly stated Theorems, Lemmas, and Corollaries
- Complete proofs (no sketch-only arguments unless standard)
- Converse + Achievability results if proposing capacity regions
- Use of quantum entropy measures:
- Von Neumann entropy
- Coherent information
- Holevo information
The paper should look like classical Shannon theory but quantum.
3? Expected Structure (TIT Standard)
Instruct them to follow this structure:
- Introduction
- Clear gap in existing quantum network literature
- Why classical results do not directly extend
- Summary of contributions
- System Model
- Mathematical channel definitions
- Assumptions
- Main Results
- Theorem statements
- Capacity region expressions
- Proof Sections
- Achievability proof
- Converse proof
- Special Cases / Extensions
- Reduction to classical case
- Entanglement-assisted version
- Discussion (Short and Technical)
- Implications for quantum internet
4? Novelty Requirement (Very Important)
Tell them:
The manuscript must contribute at least one of:
- New quantum network capacity region
- New outer bound tighter than existing literature
- New coding scheme (quantum superposition coding, etc.)
- Non-asymptotic bounds
- Strong converse theorem
Incremental extensions of known results will be rejected.
5? Literature Benchmarking
They must compare against major quantum information results and show how this work advances beyond:
- Multi-user classical information theory
- Known quantum Shannon theory results
- Existing quantum MAC/broadcast papers
Explicit comparison section required.
6? Writing Style Requirements
Tell them:
- No informal explanations dominating the paper
- No marketing language
- No buzzwords (AI, blockchain, etc.) unless mathematically formalized
- Clear notation table
- Consistent symbols throughout
7? Technical Quality Checks (Before Submission)
Ask the writer to verify:
All entropy identities are correct
All inequalities are justified (data processing, strong subadditivity, etc.)
No unproven assumptions
All proofs logically complete
All claims mathematically supported
8? Formatting Compliance
Follow IEEE TIT guidelines:
- Two-column IEEE format
- Proper theorem environments
- Correct reference style
- Page limit respected
9? What Reviewers Will Look For
Tell the writer the reviewers will ask:
- Is this fundamentally new?
- Is the math correct and non-trivial?
- Does this generalize classical theory meaningfully?
- Is the capacity region tight?
If the answer to any is weak rejection likely.
Golden Rule for Acceptance
For IEEE Transactions on Information Theory, the paper must answer:
“What new fundamental limit of quantum information transmission does this work establish?”
If it cannot answer that clearly it will not be accepted.
Requirements: 100000
-
Incident Response
Hello,
Can you go to this website and I will share the log in information, and complete this lab?
and after you submit create the screen shots and give them to me please.
Assisted Lab: Using Nontraditional Vulnerability Scanning Tools
The website:
Requirements: you need to pass
-
Computer network fundemental
Overall Theme
The assignment tests your understanding of:
- Network components (routers, switches, servers, etc.)
- Network performance (bandwidth and delay)
- Communication media (Ethernet, fiber, etc.)
- DNS protocol
- Packet analysis using Wireshark
- Practical network design using Packet Tracer
So it mixes theory + math + practical tools.
Task 1 Network Design for a Clinic (Abu Dhabi Scenario)
In this task, you act like a network consultant.
There is a clinic with:
- Many staff members
- Workstations
- Telemedicine systems
- Tablets
- A weak router
- Poor Wi-Fi coverage
- Security concerns
You must:
- Propose a new improved network design
- (better router, managed switches, firewall, access points, etc.)
- Explain:
- Why your solution is better
- How it improves performance
- How it improves security
- How it solves latency problems
- Draw the network in Cisco Packet Tracer
- (no configuration needed, just topology)
- Explain scalability
- (how the network can handle future growth)
This part checks:
- Network components knowledge
- Real-world design thinking
- Security awareness
- Performance optimization
Task 2 Network Design & Delay Analysis (Logistics Company)
You are given a network with:
- Two routers
- One server
- Two PCs
- Four segments
- Different bandwidths
- Different propagation delays
- Router processing + queuing delays
- Packet size = 1500 bytes
You must:
- Choose the best communication medium for each segment
- (e.g., fiber, Ethernet, etc.)
- and compare with one alternative.
- Calculate the total delay from PC0 to PC1.
That includes:
- Transmission delay
- Propagation delay
- Processing delay
- Queuing delay
- Explain pipelining in packet-switched networks:
- What it is
- Why it improves file transfer time
- Why it matters for streaming
This part checks:
- Mathematical understanding of delay
- Media comparison knowledge
- Packet-switching theory
Task 3 DNS Analysis Using Wireshark
You must:
- Capture DNS traffic in Wireshark.
- Filter DNS packets.
- Analyze:
- Source & destination ports
- Transaction ID
- Record type (A, AAAA, etc.)
- TTL
- Returned IP addresses
- MAC addresses
- Explain:
- Why DNS uses UDP
- What TTL means
- What DNS spoofing is
- Why Google has multiple IP addresses
This part checks:
- Protocol understanding
- Packet structure knowledge
- Logical vs physical addressing
- Practical networking skills
-
CIST1001 savannah tech unit 5 discussion
A professional dialogue, including references, is expected. Use your own words and research. All spelling and grammar must be correct. All posts must contain between five and ten sentences of useful information. “I agree,” and repeating another student’s words does not qualify as “useful”. No AI-generated material is allowed.
- Ensuring Safety and Security Online. Your manager asked you to prepare information that teaches employees how to guard against malware and other security threats. Put together five to ten sentences, giving safety tips to the employees. Do not copy a chart or list.
- Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if ONE of the following events occur:
- Virus attack
- Power failure
- Fire
- Burst water pipe
- ISP failure
What other scenarios do you think are important to plan for?
Requirements: 2-3 paragraphs
-
Computer Network Protocols
Computer Network Protocols (0105400)
Assignment 1
Spring
2025/2026Deadline: 20 Feb 2026
Student ID
Student Name
Question #
Course Learning
Outcomes (CLO)Total
MarkStudent
Marka
2
5
b
3
5
Total: 10
Instructions:
1. Read these instructions and the questions carefully.
2. Do not forget to write your name and your student id.
3. This is an individual assignment; you cant solve it in groups or with partners.
4. Plagiarism is not tolerated.
Question 1.
a) List 5 application layer protocols of your choice and explain each one of them in your own words.(5 Points)
b) Consider TCP and UDP, draw figures presenting TCP and UDP, which one is used for reliable data transfer and why?(5 Points)
Requirements: Question