Category: Computer Science

  • IEEE journal article writing

    IEEE Internet of Things Magazine

    topic —– Quantum-Secure Communication for Defense IoT Networks

    Understand the Magazine (Very Important)

    This is a magazine, not a pure theory journal.

    The article must:

    • Be accessible and tutorial-style
    • Focus on practical architectures & implementation
    • Avoid heavy mathematical proofs
    • Include figures, system diagrams, and use-case illustrations
    • Discuss industry and deployment perspectives

    Tell your writer:

    Write for engineers and practitioners, not theoretical physicists.


    2? Mandatory Technical Coverage for This Topic

    Ensure the article includes:

    A. Clear Problem Definition

    • Why classical IoT crypto fails in the post-quantum era
    • Defense IoT vulnerabilities (battlefield sensors, UAV swarms, secure comms)
    • Quantum computing threat timeline

    B. Core Technical Components (Must Cover)

    1. Post-Quantum Cryptography (PQC) for IoT
      • NIST PQC standards
      • Lightweight PQC for constrained devices
      • Migration challenges
    2. Quantum Key Distribution (QKD)
      • How QKD works (simple explanation)
      • Fiber vs satellite QKD
      • Feasibility in tactical networks
    3. Hybrid Classical-Quantum Architectures
      • Edge/fog integration
      • Secure routing frameworks
      • Cross-layer security design

    C. Defense-Specific Integration

    Must include:

    • Tactical IoT (IoMT Internet of Military Things)
    • Secure drone networks
    • Space-air-ground integrated defense networks
    • Resilience under jamming or cyberattack

    Without defense-specific scenarios high rejection probability.


    3? Structure You Should Mandate

    Tell the writer to strictly follow this structure:

    1. Introduction (Motivation + defense urgency)
    2. Background (Quantum threats & IoT limitations)
    3. Architecture Proposal (Include diagram)
    4. Use Case: Defense Deployment Scenario
    5. Implementation Challenges
    6. Future Research Directions
    7. Conclusion

    Also require:

    • At least 2 architecture figures
    • 1 comparative table (Classical vs Quantum-Secure IoT)

    4? Writing & Formatting Instructions

    Give these strict guidelines:

    • 4,0005,000 words (typical magazine length)
    • 1525 high-quality IEEE references
    • Recent references (last 5 years preferred)
    • Avoid equations unless absolutely necessary
    • Avoid plagiarism (IEEE is strict)
    • Use IEEE citation style

    5? Innovation Requirement (Critical for Acceptance)

    The article must include at least one of:

    • A new architectural framework
    • A defense-specific integration model
    • A layered quantum-secure IoT model
    • Deployment roadmap for military networks
    • Identified research gaps

    If it is just a survey likely rejection.


    6? Common Reasons for Rejection (Tell Your Writer to Avoid)

    Too theoretical
    Pure quantum computing discussion without IoT relevance
    No defense application
    No diagrams
    Too many equations
    No clear practical contribution


    7? Extra Tip to Increase Acceptance Probability

    Ask the writer to:

    • Review recent articles published in the magazine
    • Align tone with existing articles
    • Mention practical deployment challenges
    • Include a short Industry & Standardization Outlook section

    8? Final Quality Checklist Before Submission

    Ensure:

    • Technical accuracy
    • Clear novelty
    • Strong defense motivation
    • Clean IEEE formatting
    • Zero plagiarism
    • Professional figures (vector quality)

    Requirements: 100000

  • Computer Science Question

    title : Quantum Network Information Theory

    Generalize classical multi-user information theory to quantum networks:

    • Quantum multiple access channels
    • Quantum interference channels
    • Entanglement routing capacity in large-scale quantum internet

    Critical for the future quantum internet and distributed quantum computing.

    Scope Alignment (Mandatory)

    Tell the writer:

    • The paper must focus on fundamental limits, not system implementation.
    • Core contribution must be new theorems, capacity bounds, or converse proofs.
    • Work must clearly extend classical network information theory into the quantum regime.
    • Avoid engineering optimization unless supported by new theoretical proofs.

    No simulation-only papers
    No architecture-only discussion
    No review/survey style


    2? Mathematical Depth Requirements

    Require:

    • Formal problem definition using Hilbert spaces and CPTP maps
    • Precise channel model (e.g., quantum MAC, broadcast channel, interference channel)
    • Clearly stated Theorems, Lemmas, and Corollaries
    • Complete proofs (no sketch-only arguments unless standard)
    • Converse + Achievability results if proposing capacity regions
    • Use of quantum entropy measures:
      • Von Neumann entropy
      • Coherent information
      • Holevo information

    The paper should look like classical Shannon theory but quantum.


    3? Expected Structure (TIT Standard)

    Instruct them to follow this structure:

    1. Introduction
      • Clear gap in existing quantum network literature
      • Why classical results do not directly extend
      • Summary of contributions
    2. System Model
      • Mathematical channel definitions
      • Assumptions
    3. Main Results
      • Theorem statements
      • Capacity region expressions
    4. Proof Sections
      • Achievability proof
      • Converse proof
    5. Special Cases / Extensions
      • Reduction to classical case
      • Entanglement-assisted version
    6. Discussion (Short and Technical)
      • Implications for quantum internet

    4? Novelty Requirement (Very Important)

    Tell them:

    The manuscript must contribute at least one of:

    • New quantum network capacity region
    • New outer bound tighter than existing literature
    • New coding scheme (quantum superposition coding, etc.)
    • Non-asymptotic bounds
    • Strong converse theorem

    Incremental extensions of known results will be rejected.


    5? Literature Benchmarking

    They must compare against major quantum information results and show how this work advances beyond:

    • Multi-user classical information theory
    • Known quantum Shannon theory results
    • Existing quantum MAC/broadcast papers

    Explicit comparison section required.


    6? Writing Style Requirements

    Tell them:

    • No informal explanations dominating the paper
    • No marketing language
    • No buzzwords (AI, blockchain, etc.) unless mathematically formalized
    • Clear notation table
    • Consistent symbols throughout

    7? Technical Quality Checks (Before Submission)

    Ask the writer to verify:

    All entropy identities are correct
    All inequalities are justified (data processing, strong subadditivity, etc.)
    No unproven assumptions
    All proofs logically complete
    All claims mathematically supported


    8? Formatting Compliance

    Follow IEEE TIT guidelines:

    • Two-column IEEE format
    • Proper theorem environments
    • Correct reference style
    • Page limit respected

    9? What Reviewers Will Look For

    Tell the writer the reviewers will ask:

    • Is this fundamentally new?
    • Is the math correct and non-trivial?
    • Does this generalize classical theory meaningfully?
    • Is the capacity region tight?

    If the answer to any is weak rejection likely.


    Golden Rule for Acceptance

    For IEEE Transactions on Information Theory, the paper must answer:

    “What new fundamental limit of quantum information transmission does this work establish?”

    If it cannot answer that clearly it will not be accepted.

    Requirements: 100000

  • Unit VIII

    In this journal, you will embark on a journey of exploration into emerging technologies that intrigue you; be it virtual reality, wearables, IoT, or any other fascinating field. You will research a chosen technology and reflect on your learning journey, sharing insights gained, challenges faced, and areas primed for growth. Complete the following:

    Part 1

    Research an emerging technology that excites or interests you (i.e., virtual reality, wearables, IoT, etc.). Your chosen technology should be one that is driving innovation and transformation across different industries and societal domains. Make sure to discuss the following:

    • What the emerging technology is
    • Why the emerging technology is of interest you
    • How you envision the technology impacting various industries or aspects of society
    • How you foresee this emerging technology shaping the future job market and career opportunities
    • What ethical considerations surround the development and deployment of the emerging technology you chose

    Part 2

    You are invited to delve into your learning journey throughout the course, exploring insights gained, challenges overcome, and areas for growth. Discuss the following:

    • What were the most valuable insights or skills you gained from this course, and how do you plan to apply them in your academic or professional pursuits? Explain challenges overcome and areas for growth.
    • Reflecting on this course, describe what you have learned about computer-based information systems, and discuss how to distinguish between application software and system software.

    Your journal must be at least three pages in length. You should use headings to discern Part 1 from Part 2 in your repose. You must use at least 2 sources to support your journal. Adhere to APA Style when constructing this assignment, including in-text citations and references for all sources that are used.

  • Unit VII Powerpoint

    In this assignment you will demonstrate what you have learned in Units V and VII. This assignment will have three parts. Using Microsoft PowerPoint, create a presentation that addresses the prompts in each part of the assignment. Label each slide section as Part 1, Part 2, and Part 3 to help delineate your presentation topics.

    Part 1: Cybercrime and Computer Ethics

    • Research and present a recent security breach involving software, such as Microsoft Windows, Microsoft Azure, WordPress, and others. Introduce the security breach from your research. Introduce the privacy, security, and ethical issues of the security breach.
    • Using speaker notes, discuss in detail information about the breach, such as the cause of the breach and the consequences of the security breach. Also discuss in detail the privacy, security, and ethical issues of the security breach. If you have experienced this in real-life, feel free to share your experience.

    Part 2: Social Engineering

    • Discuss at least four types of social engineering attacks.
    • Using speaker notes, discuss in detail information about each of the social engineering attacks and provide examples for each including real-life experiences.

    Part 3: Problem-Solving Using SDLC

    • Using the drawing tools in MS PowerPoint to draw the phases of the software development lifecycle (SDLC) model. Explain how the software development lifecycle can be used to design, develop, test, and deploy software, specifically for developing a game in C++.
    • Using speaker notes, briefly discuss each phase of the lifecycle. Also, expand upon how the software development lifecycle can be used to design, develop, test, and deploy software.

    All three parts of your presentation should be submitted in one PowerPoint document. You should use at least two visuals to add visual appeal, such as clip art, graphics, charts, and such. The total length for this assignment should be at least ten, not counting the title or references slides. Use headings and labels to identify the different parts and sections of the assignment.

    You are required to use speaker notes to add information to further explain the material on your slides. Your presentation must use at least two outside resources. Adhere to APA Style when constructing in-text citations and references for all sources that are used.

    If you are unfamiliar with PowerPoint, view the for additional assistance.

    Resources

    The following resource(s) may help you with this assignment.

  • Project proposal

    You will develop a proposal for your final year project. In the proposal, you are requested to define the proposed artefact and identify a suitable research methodology. A member of staff who has agreed to supervise the project will formatively assess a draft version of the proposal and provide suggestions for improvement. A centrally managed process will be used to screen project proposals to ensure that they are suitable. This will help to ensure that your project is relevant to your degree pathway, builds upon material you have covered in other units, and is appropriately challenging for Level 6 studies. Your submission will then consist of the approved project proposal form, ethics form and a list of external resources (journal articles, white papers, web sites etc) that will inform your initial research.

    Attached Files (PDF/DOCX): CIS013-3 Assignment 1 brief.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • this whole question is related to digital forensics

    i will upload 3 files below 2 of them will be templates and other one will have all the instructions needed for assignment. i want you to read the instructions carefully do it step by step and make sure to not skip even one thing just follow what they say. if they say use this then do this.

    Requirements: idk

  • Threat Analysis and Mitigation Plan

    About this Assignment

    In this assignment, you will investigate security risks and IoT (Internet of Things) devices. You will analyze a specific threat (e.g., smart thermostat, industrial IoT devices, appliances, etc.), and describe how attackers might gain access to exploit vulnerabilities. You will develop a mitigation plan against this threat.

    Course Learning Outcomes

    The following course learning outcomes are assessed in this assignment:

    • Explain how cybersecurity threats can be remediated or avoided
    • Describe techniques to protect against cyber threats to operating system and networking resources
    • Distinguish between different types of cybersecurity threats (software-based, hardware-based, and personnel-based) based on their attributes and their effects on people, technology, and practices

    Related Lessons

    The following lessons will be helpful as you complete this assignment:

    Attached

    Prompt

    In order to successfully complete this assignment, you will need to select a viable IoT component, thoroughly explore the security risks associated with this device, describe how attackers can exploit vulnerabilities of the component, and develop a mitigation plan. The following are the deliverables for this assignment:

    1. Choose an IoT Device: Provide a brief overview of IoT devices and the security threats that are associated with them. Select a specific IoT device for your analysis.
    2. Investigate Risks Associated with the Device: Thoroughly analyze the security risks associated with this device.
    3. Describe Attack Methods: Describe various attack methods that hackers may use to gain access to the device: including actions they might take, and the consequences of them hacking this device. Be sure to connect the risks you defined earlier: how could these vulnerabilities be exploited?
    4. Develop a Mitigation Plan: Based upon the risks and attack methods you analyzed earlier, create a mitigation plan to protect against these threats.
    5. Putting it All Together: Your paper should be between 1500 and 2500 words.

    Formatting & Sources

    Please write your paper in the APA format. You may refer to the course material for supporting evidence, but you must also use 3 to 5 sources and cite them using APA format. Please include a mix of both primary and secondary sources, with at least one source from a scholarly peer-reviewed journal. If you use any Study.com lessons as sources, please also cite them in APA (including the lesson title and instructor’s name).

    • Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
    • Secondary sources come from peer-reviewed scholarly journals, such as IEEE Transactions on Information Forensics and Security, Journal of Computer Security, and International Journal of Information Security. You may use sources like JSTOR and Google Scholar to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)

    Use of AI in Study.com Assignments

    Acceptable use of generative AI tools such as ChatGPT is outlined in the ; please familiarize yourself with this policy to ensure that you have appropriately cited and used AI tools in an authorized manner in the creation of your assignment. You may wish to use to ensure that your assignment is sufficiently unique and free from AI plagiarism.

    Reminders about using AI:

    • AI may be used as a tool to support your process for creating this assignment but may not create or write your assignment response for you. Plagiarized submissions will not be graded and may result in disciplinary actions.
    • All AI usage for this assignment must be properly cited and documented according to the guidelines in the article.
    • In addition to in-text citations and inclusion in your Works Cited for the assignment, you must submit a separate document as outlined in the Documenting and Attributing AI section of the above article.
    • It is important to fact-check any output you obtain using AI as it may produce inaccuracy or misinformation.
    • You are solely responsible for all submitted work that you provide with the use of AI.
    • Do not input any confidential or personal information while using AI tools.

    For additional information on generative AI tools, please refer to .

    Attached Files (PDF/DOCX): 1.pdf, 3.pdf, 2.pdf, 4.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • IT532 | Computer Forensics | Week 6 Discussion: Intrusion De…

    Discussion Topic:

    Search the internet for an Intrusion Detection System, share a link, and in 2-3 paragraphs describe what the tool is, how it is used, and what its primary features are. Especially with the increased risk of AI cyberattacks how could we use/utilize existing AI models to protect systems?

    Grading Guidelines (100%)

    • Initial Post (50%): 200-250 words with at least 1 peer reviewed resources, submit
    • Citations (10%): Proper use and APA format.
    • Replies (50%): Minimum 2 thoughtful and valuable replies to others (50 words each) submit

    Requirements: * Initial Post (50%): 200-250 words with at least 1 peer reviewed resources. * Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each

  • Writing a process

    The sentences have to be outlined like in the template. The essay topic is “writing a process”. Be specific on the thesis

    Attached Files (PDF/DOCX): OUTLINE TEMPLATE.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • IT530 | Cloud Computing | Discussion 6: Cloud Foundations,…

    Discussion 6: Cloud Foundations, Models, and Security Threats

    Number of replies: 14

    Discussion:

    “In the context of ‘Organizational Agility,’ how does the shift from capital expenditure (CapEx) to operational expenditure (OpEx) through cloud adoption change an IT department’s role from a cost center to a strategic partner?”

    Grading Guidelines (100%)

    • Initial Post (50%): 200-250 words with at least 1 peer reviewed resources, submit.
    • Citations (10%): Proper use and APA format.
    • Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each) submit

    Requirements: * Initial Post (50%): 200-250 words with at least 1 peer reviewed resources. * Replies (50%): Minimum TWO (2) thoughtful and valuable replies to others (50 words each