Archive for the ‘IEEE’ Category

investigation brute-force attack using SIEM

Topic: Log mining for security breaches identification.The growth of unstructured messages generated by computer systems and applications in modern computing environment poses a significant challenge in managing and using the information contained in the messages. Although these data contain a wealth of information that is useful for advanced threat detection, the high volume, variety, and […]

Digital Forensics on Solid State Drives and NVMe devices: Data acquisition and steps of investigation

Project Description Digital Forensics on Solid State Drives and NVMe devices: Data acquisition and steps of investigation. Over the years, technology has advanced in much faster pace that it was a decade ago, thus, people rely heavily in utilizing and transferring a large amount of data using their HDD, SSD and NVMe storage devices. In […]

Physics in Basketball

Audience :Peers in your field (civil engineering) A literature review assembles and synthesizes current contributions to academic knowledge about its topic. You can think of a scientific literature review as a kind of bibliographic essay or a survey of the research front (see the White reading). You might think of it as a more developed, […]

IEEE research paper

a review paper, in the form of an IEEE conference paper on an alternative to silicon as a material for semiconductor-based electronics. (have at least 4 references that come from the peer-reviewed literature. Journal papers are the best choice, but also full-length (4+ pages) conference papers can constitute 2 of the 4 references.)

Statistics: Brief Description For Some Graph Descriptions

I require a brief explanation for the following terms:    Mean:    Maximum:    Minimum:    Variance:    Standard Deviation:    Kurtosis:    Skewness:     Median:    Quantile:    Sum Squared:    Range: A brief explanation for each term, no introduction body conclusion or anything. Only the a brief definition and IEEE citation for any source used.

cultural self analysis paper

    Sir David Cannadine (2013, as cited in Jandt): There are six main forms of regulators of social networks of human life: religion, nation, class, gender, race, and civilization.Choose one of the regulators of identity mentioned in Jandt Chapter 1 (see Jandt text, lecture notes and watch Dr. Glendas Lecture 1 on YouTube). Explain […]

Audio Signals Processing

For the attached document, explain how each feature can be applied to obtain a plot graph or results. is there functions/equations to be used? what data should be provided to process using the subjected feature? (Audio graph or Amplitude x Time graph)

Frequency/Audio signal processing

*This is not a report kind of research. No intro, body, conclusion required* I am asking for a list of signal processing features for  an audio based graph. For the audio graph, list as much signal processes with a brief description and why it’s important for audio based graphs. I am currently working on a […]

Distributed databases, NOSQL, and Big data

Could you please add another 4 pages to the writing already created and attached? – Using the IEEE template (see link below), write a literature review paper that should summarize: “Distributed databases, NOSQL, and Big data”    –– Your paper should have a minimum of 4 pages– The paper has to present at least […]

Usability evaluation of E-learning website in Saudi Arabia

references:1- 2- file:///C:/Users/SONY/AppData/Local/Temp/Usability_Evaluation_of_an_Educational_Website_in_.pdf 3- K.  Orfanou,  N.  Tselios,  and  C.  Katsanos,  “Perceived  usability  evaluation  of  learning  management systems: Empirical evaluation of the System Usability  Scale,” The International  Review  of Research in Open and Distributed Learning, vol. 16, 2015. 4- M.  Alshammari,  R.  Anane,  and  R.  J.  Hendley,  “Design  and  Usability  Evaluation  of  Adaptive  e-learning […]

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes