Category: IEEE

cultural self analysis paper

    Sir David Cannadine (2013, as cited in Jandt): There are six main forms of regulators of social networks of human life: religion, nation, class, gender, race, and civilization.
Choose one of the regulators of identity mentioned in Jandt Chapter 1 (see Jandt text, lecture notes and watch Dr. Glendas Lecture 1 on YouTube).  https://www.youtube.com/channel/UCoVdljct4REgnchsA8qzB6Q
Explain how this regulator affects your communication with others in two/three main ways.
    Support your explanations using the concepts and ideas in Unit 1 in addition to (at least) two other academic sources of your own choice (e.g., a book, a book chapter, or a journal article).
    Give examples from your own life in support of your explanations.
    Consider how your communication varies depending on who you are interacting with as well as the medium you are using during the communication process.
    Follow a typical essay organization (i.e., introduction, body, and conclusion), and give an appropriate title to your essay.

Paper Formatting: 
Your paper MUST be typed using the following formatting
    Length: 2 pages
    Line spacing: single
    Font: Times New Roman
    Font size: 12-point
    Space between paragraph: 1 line
    Alignment: Both sides aligned
    Margins: 1 margins of 1 on all sides (Normal)
Documenting Source Information: IEEE Style
    The documentation of sources (In-text citations & end-of-paper references) must follow the IEEE style guideline format. ALWAYS pay careful attention to the order of information and the use of spaces, punctuation and italics.  See samples below.

Audio Signals Processing

For the attached document, explain how each feature can be applied to obtain a plot graph or results.
is there functions/equations to be used?
what data should be provided to process using the subjected feature? (Audio graph or Amplitude x Time graph)

Frequency/Audio signal processing

*This is not a report kind of research. No intro, body, conclusion required*

I am asking for a list of signal processing features for  an audio based graph.

For the audio graph, list as much signal processes with a brief description and why it’s important for audio based graphs.

I am currently working on a project where I have an audio and a frequency based graphs that I require to process their signals. I need to find and know how to apply the signal processing tools for the audio graph so that I can analyze it further.

Again, this is not a report kind of research. I only require a LIST of audio signal processing features please.

Distributed databases, NOSQL, and Big data

Could you please add another 4 pages to the writing already created and attached?

– Using the IEEE template (see link below), write a literature review paper that should summarize: “Distributed databases, NOSQL, and Big data”
    – https://www.ieee.org/conferences/publishing/templates.html
– Your paper should have a minimum of 4 pages
– The paper has to present at least the following sections
    – Introduction
    – Literature review on distributed databases
    – Literature review in NOSQL databases
    – Literature review on big data
    – Practical applications
        – Include multiple subsections (one for each example)
    – Final remarks and Conclusions
– You should consider other references beyond our textbook
  – Check the syllabus for the textbook reference
– The paper should consider
  – Definitions
  – A brief explanation of each of those concepts
  – A practical example of each

Usability evaluation of E-learning website in Saudi Arabia

references:
1- https://airccj.org/CSCP/vol7/csit77001.pdf

2- file:///C:/Users/SONY/AppData/Local/Temp/Usability_Evaluation_of_an_Educational_Website_in_.pdf

3- K.  Orfanou,  N.  Tselios,  and  C.  Katsanos,  “Perceived  usability  evaluation  of  learning  management systems: Empirical evaluation of the System Usability  Scale,” The International  Review  of Research in Open and Distributed Learning, vol. 16, 2015.

4- M.  Alshammari,  R.  Anane,  and  R.  J.  Hendley,  “Design  and  Usability  Evaluation  of  Adaptive  e-learning Systems Based on Learner Knowledge and Learning Style,” in Human-Computer Interaction, 2015, pp. 584-591.

5- S.  H.  Mustafa  and  L.  F.  Al-Zouabi,  “Usability  of  the  academic  websites  of  Jordan’s  universities an evaluation  study,”  in  Proceedings  of  the  9th  International  Arab  Conference  for  Information Technology, 2008, pp. 31-40.

6- S. Kaur, K. Kaur, and P. Kaur, “Analysis of website usability evaluation methods,” in Computing for Sustainable  Global  Development  (INDIACom),  2016  3rd  International  Conference  on,  2016,  pp. 1043-1046.

7- M.  Y.  Ivory  and  A.  Chevalier,  “A  study  of  automated  web  site  evaluation  tools,”  University  of Washington, Department of Computer Science2002, 2002.

8- F.  Oliha,  “Web  portal  usability  among  Nigerian  university  students:  A  case  study  of  University  ofBenin, Nigeria,” Nigerian Journal of Technology, vol. 33, pp. 199-206, 2014.

9- Noiwan, J., Norcio, A. (2000). A comparison analysis on web heuristic usability between Thai academic web sites  and  US  academic  web  sites. Proceedings  of  SGI,  World  Multi  Conference  on  Systems, Cybermetrics  and  Informatics.  Concepts  and  Applications  of  Systems,  Cybermetrics  and  Informatics, Orlando, Florida, USA, 536541

10- Kostaras, N., Xenos, M. (2006). Assessing educational web-site  usability  using  heuristic  evaluation rules. Proceedings of 11th Panhellenic Conference in Informatics

Any topic (writer’s choice)

WRITTEN 4.2
This assignment is about writing an informal report recommending a company action based on a technical analysis.

SCENARIO

Youve received a promotion at DeepBlue Ocean Informatics. As part of Janvis development team, you helped resolve DOIs fish detection model. Janvi was promoted to head of operations and gave you responsibilities for special projects in her department.

Business is booming. DOI is hiring more people, gaining new customers, and being asked for more help from existing customers. The company has changed from a one-city startup to 328 people working in 11 countries. Almost all employees work from their homes. New hires are joining the company at the rate of 10-20 a month. Since the global pandemic, video conferencing has gone from nice to have to must have, and with such rapid growth, each department has been using the video conferencing tool of their choice.

Janvi wants to standardize DOI’s video conferencing to a single platform. She believes the company will be able to better track new features, ease connectivity between employees, increase customer satisfaction, and deliver more comprehensive training during on-boarding. She knows you have been researching video conference tools. She regards you as a trusted go-to person.

She wants you to recommend the best platform for DOI’s needs.

TASK

Prepare the first draft of a report that recommends a single video conferencing tool for the company.

Include internal and external factors that influence the choice.
Interpret the facts you gathered in Written 4.1 to arrive at conclusions based on the DOIs needs.
Justify your recommendation based on the facts contained in your report.
This first draft should include, in this order:

Summary
Background/Context 
Details (your summaries and illustrations from Written 4.1) 
Conclusions 
References  (your references from Written 4.1 – with any additions from the new material)
This will be a total of 2 – 4 new pages, plus any additions to references. See below for a suggested breakdown.

FAQ

1 – What citation method should I use?

Use IEEE. 

2 – Is this a .ppt or word or PDF document?

Use MS Word and submit as a PDF file.

2 – What size font and how much spacing should I use?

Use a 12 point serif font (e.g. Times New Roman) for the body text. Make paragraphs single-spaced. Choose headings and layouts based on CRAP principles applied to documents. 

3 – Should I use paragraphs or bullet points?

Use full paragraphs.

4 – Can you provide more detail about what should be in each section?

SUMMARY – .5 page (NEW)
A condensed version of the full report
Gives a complete understanding of the elements without further reading
BACKGROUND/CONTEXT – .5 – 1.5 pages (NEW)
Reason, scope, internal and external factors that might influence the decision
Helps the reader consider more than the specific tools under review

DETAILS – 2-4 pages (EXISTING)
Your factual summaries and illustrations from Written 4.1

CONCLUSIONS – 1 – 2 pages (NEW)
Interpretations of the facts presented and offers original insights
Justifies the recommendation for a single tool to be selected

REFERENCES – Length as needed (EXISTING + ADDITIONS)
from Written 4.1 plus any additions from the new sections
5 – Do I include the material I did for 4.1?

Yes, cut-and-paste your work from 4.1 into 4.2 to form a complete document.

6 – Should I make corrections to 4.1?

There is no benefit to making changes in your 4.1 material. Only the new sections will be graded for this assignment.

Research paper about Polyether ether ketone (PEEK) polymer

I will attach a PDF file under the name ” Project Information” that shows the exact task requirements for writing a research paper about polyether ether ketone polymer. I will also attach the rubrics on which the paper will be graded. Kindly follow the attached file exactly to conduct this research paper.

Distributed databases, NOSQL, and Big data

**Must be in IEEE FORMAT and NOT double spaced, please.**

– Using the IEEE template (see link below), write a literature review paper that summarizes
  part 10 of our textbook: “Distributed databases, NOSQL, and Big data”
  https://www.ieee.org/conferences/publishing/templates.html
– Your paper should have a minimum of 4 pages
– The paper has to present at least the following sections
      * Introduction
      * Literature review on distributed databases
      * Literature review in NOSQL databases
      * Literature review on big data
      * Practical applications
              * Include multiple subsections (one for each example)
      * Final remarks and Conclusions
– You should consider other references beyond our textbook
      * Check the syllabus for the textbook reference
– The paper should consider
      * Definitions
      * A brief explanation of each of those concepts
      * A practical example of each

Wireless and Mobile Device: Near-Field communication and Bluetooth Security Aspects

The paper is between 6 pages and 8 pages (single spaced lines, font size <=11). You should reference at least six to nine journals or refereed conference papers.

This is survey research project for exploring the technical side of all Near-field communication and Bluetooth technologies. It is a thorough description of each type and their application, their drawbacks from a deep technical stance and proposing a solution that will address the problems of the older models of Bluetooth and NFC and provide the optimum solutions all the security problems that may arise due to older versions of Bluetooth and NFC. The entire report should be written from a technical and expert point of view and not general references and term, but dive deep into the explanations and descriptions.

You need to explain the features and the attacks against these wireless technologies in your research paper

Bluetooth versions 1.0 ,1.1 ,1.2 ,2.0 ,2.1 ,3.0 ,4.0 ,4.1 ,4.2
NFC

Project Survey

1. Abstract [also need to add keywords for the research, important terms not known to common readers]

2. Introduction
    Discuss the background and motivation of your work. (What inspired the writing of this document, raising awareness with indepth knowledge)
    Summarize the research problem. (All Bluetooth and NFC of all versions are prone to attacks, explain what are the potential flaws in these technologies that make them vulnerable)
    Summarize the proposed solution/approach to the problem. (Describe how newer versions of Bluetooth and NFC is fixing issues from the previous versions, how this technology can be implemented on a corporate and global scale)

3. Problem statement

what is the problem
why it is important to solve it (motivation)
what are the related security challenges/issues
how they are related to the studied topic?

4. Requirements
    Identify and present what the requirements should the solution fulfill
o    which functionalities it provides; i.e. characteristics of each Bluetooth and NFC versions and their application of use for different scenarios
o    What properties the system should have to differentiate each one from the other

5. State-of-the-Art (should be different from background)
    Discuss research previously written by other writers related to problem described in section 3
    Classify, organize/categorize the different solutions
    Compare and show advantages and disadvantages of their findings
o    Analyze the solutions using the requirements: which requirements do they meet and which ones they dont from a security perspective on a personal, corporate and global level for each of the points mentions in section 5

6. Research challenges
If you want to design a system that solves the problem you described and meet all the requirements you identified, what will be the challenges that you have to solve? The optimum solution is Bluetooth v4.2
    Identify the challenges (open issues) related to the solution
    Categorize these challenges
    Give a detailed description of each challenge: explain what is the challenge, why it is difficult to solve, etc.

7. Roadmap and hints
    in which order may the challenges be addressed
    give hints about how to solve each (most) of the identified issues

8. Conclusions
    Summarize the conclusions of your work. Future work is optional.

9. References
    List all the citations referenced in your paper minimum of 20-30. You will lose 1 points for each missing or dangling reference (i.e., the reference not cited in the main text).
    Use IEEE format, and present the references in order [1], then [2], etc.;
o    The first reference to be referenced in the paper is [1], the second to be referenced is [2], etc.
o    Total of 6 to 9 references are required for this is report

o Format, respect of outline, quality of English
o The paper should have single spaced line with the font size 11 Times New Roman.

———————————————————————————————————————————

NOTE: paper structure, presentation, and writing style will be taken into consideration.
    You must use an IEEE format for your paper

The paper is between 6 pages and 8 pages (single spaced lines, font size <=11). You should reference at least six to nine journals or refereed conference papers.

Some Reference:

NIST Special Publication 800-121, Revision 2
Guide to BluetoothSecurity

Forensically Investigating IoT Related Crimes

Forensically Investigating IoT Related Crimes
Instructions:

Our research project is about how digital forensics science plays an important role in investigating and acquiring evidence that will help in resolving the cyber crimes which are related to Iot.

The paper will have an introduction which will give a brief glance of what is digital forensics and what is cybercrimes, it will also address different methods used in forensically conducting an investigation, it will also give examples of how digital forensics helped to identify suspects based on their various activities according their malicious intent of some. The paper should include some examples of the cybercrimes in IoT and their solution.

Also, the paper will include a literature review part, where we will be critically analyzing existing literature in when it comes to digital forensics methods in relation to IoT and discuss how our approach will differ or build upon the previous work. Furthermore, we will have methodology part, this part we will determine what is the best methodology that we think is  feasible or relevant based on our readings in the literature review when it comes to digital forensics and IoT.

Additionally, forensics tools and software for IoT, here we should mention different tools of IoT forensics with their screenshots. The tools should be mentioned with its use and benefits that it can provide any investigator who investigates IoT crimes.

Lastly, we will have a conclusion part where we will summarize the key aspects of the research, expected results, potential future work and overall opinion on the research.

The research SHOULD include figures and statistics of processes, methodologies and investigation applications. It should be from 2000 to 2500 words maximum. The references should not be less than 9.

1-Abstract [also need to add keywords for the research, important terms not known to common readers]

2-Introduction
Introduce digital forensics, IoT and cybercrimes.
Outline the importance of digital forensics science in resolving IoT cybercrimes in today’s date.
Address methods used to forensically sound investigate IoT cybercrimes.
Give examples of real-life IoT cybercrimes that digital forensics have helped to find evidences to solve.

3-Literature Review
Describe the most relevant prior work and their key insights.
Critically analyzing existing literature in cybercrimes related to IoT and digital forensics.
Detailed discussion on pros and cons of each methods found.

4-Methadology
Based on the readings, describe the best method found for forensically investigating IoT cybercrimes.
Discussion why this particular methodology in particular was select over the rest
Discuss how your approach will differ or build on previous methodologies.

5-Expermintal procedures
Detailed description of what you are trying to accomplish.
Specify tools you will be using in investigation IoT cybercrimes.
Explain the proper procedures in a step by step fashion which are done in investigating IoT cybercrimes to beginning to end
Predict future results using a given scenario

6-Conclusion
Summarize the key aspects of the research
Imply potential future work
Opinion on the research carried out

7-Refereces page
Please provide 9 or more references no less.

Grading will be based on the following:
Content depth and analysis [60%] | Content organization [10%] | Language accuracy[10%] | Presentation[15%] | Language accuracy[5%]