+1(316)4441378

+44-141-628-6690

Archive for the ‘IEEE’ Category

cultural self analysis paper

    Sir David Cannadine (2013, as cited in Jandt): There are six main forms of regulators of social networks of human life: religion, nation, class, gender, race, and civilization.
Choose one of the regulators of identity mentioned in Jandt Chapter 1 (see Jandt text, lecture notes and watch Dr. Glendas Lecture 1 on YouTube).  https://www.youtube.com/channel/UCoVdljct4REgnchsA8qzB6Q
Explain how this regulator affects your communication with others in two/three main ways.
    Support your explanations using the concepts and ideas in Unit 1 in addition to (at least) two other academic sources of your own choice (e.g., a book, a book chapter, or a journal article).
    Give examples from your own life in support of your explanations.
    Consider how your communication varies depending on who you are interacting with as well as the medium you are using during the communication process.
   

Distributed databases, NOSQL, and Big data

Could you please add another 4 pages to the writing already created and attached?

- Using the IEEE template (see link below), write a literature review paper that should summarize: "Distributed databases, NOSQL, and Big data"
    - https://www.ieee.org/conferences/publishing/templates.html
- Your paper should have a minimum of 4 pages
- The paper has to present at least the following sections
    - Introduction
    - Literature review on distributed databases
    - Literature review in NOSQL databases
    - Literature review on big data
    - Practical applications
        - Include multiple subsections (one for each example)
    - Final remarks and Conclusions
- You should consider other references beyond our textbook
  - Check the syllabus for the textbook reference
- The paper should consider
  - Definitions
  - A brie

Usability evaluation of E-learning website in Saudi Arabia

references:
1- https://airccj.org/CSCP/vol7/csit77001.pdf

2- file:///C:/Users/SONY/AppData/Local/Temp/Usability_Evaluation_of_an_Educational_Website_in_.pdf

3- K.  Orfanou,  N.  Tselios,  and  C.  Katsanos,  "Perceived  usability  evaluation  of  learning  management systems: Empirical evaluation of the System Usability  Scale," The International  Review  of Research in Open and Distributed Learning, vol. 16, 2015.

4- M.  Alshammari,  R.  Anane,  and  R.  J.  Hendley,  "Design  and  Usability  Evaluation  of  Adaptive  e-learning Systems Based on Learner Knowledge and Learning Style," in Human-Computer Interaction, 2015, pp. 584-591.

5- S.  H.  Mustafa  and  L.  F.  Al-Zouabi,  "Usability  of  the  academic  websites  of  Jordan's  universitie

Any topic (writer’s choice)

WRITTEN 4.2
This assignment is about writing an informal report recommending a company action based on a technical analysis.

SCENARIO

Youve received a promotion at DeepBlue Ocean Informatics. As part of Janvis development team, you helped resolve DOIs fish detection model. Janvi was promoted to head of operations and gave you responsibilities for special projects in her department.

Business is booming. DOI is hiring more people, gaining new customers, and being asked for more help from existing customers. The company has changed from a one-city startup to 328 people working in 11 countries. Almost all employees work from their homes. New hires are joining the company at the rate of 10-20 a month. Since the global pandemic, video conferencing has gone from nice to have to must have, and with such rapid growth, each department has been using the video conferencing tool of their choice.

Janvi wants to standardize DOI's video conferencing to a single platfor

Research paper about Polyether ether ketone (PEEK) polymer

I will attach a PDF file under the name " Project Information" that shows the exact task requirements for writing a research paper about polyether ether ketone polymer. I will also attach the rubrics on which the paper will be graded. Kindly follow the attached file exactly to conduct this research paper.

Distributed databases, NOSQL, and Big data

**Must be in IEEE FORMAT and NOT double spaced, please.**

- Using the IEEE template (see link below), write a literature review paper that summarizes
  part 10 of our textbook: "Distributed databases, NOSQL, and Big data"
  https://www.ieee.org/conferences/publishing/templates.html
- Your paper should have a minimum of 4 pages
- The paper has to present at least the following sections
      * Introduction
      * Literature review on distributed databases
      * Literature review in NOSQL databases
      * Literature review on big data
      * Practical applications
              * Include multiple subsections (one for each example)
      * Final remarks and Conclusions
- You should consider other references beyond our textbook
      * Check the syllabus for the textbook reference<

Wireless and Mobile Device: Near-Field communication and Bluetooth Security Aspects

The paper is between 6 pages and 8 pages (single spaced lines, font size <=11). You should reference at least six to nine journals or refereed conference papers.

This is survey research project for exploring the technical side of all Near-field communication and Bluetooth technologies. It is a thorough description of each type and their application, their drawbacks from a deep technical stance and proposing a solution that will address the problems of the older models of Bluetooth and NFC and provide the optimum solutions all the security problems that may arise due to older versions of Bluetooth and NFC. The entire report should be written from a technical and expert point of view and not general references and term, but dive deep into the explanations and descriptions.

You need to explain the features and the attacks against these wireless technologies in your research paper

Bluetooth versions 1.0 ,1.1 ,1.2 ,2.0 ,2.1 ,3.0 ,4.0 ,4.1 ,4.2
NFC

Project S

Forensically Investigating IoT Related Crimes

Forensically Investigating IoT Related Crimes
Instructions:

Our research project is about how digital forensics science plays an important role in investigating and acquiring evidence that will help in resolving the cyber crimes which are related to Iot.

The paper will have an introduction which will give a brief glance of what is digital forensics and what is cybercrimes, it will also address different methods used in forensically conducting an investigation, it will also give examples of how digital forensics helped to identify suspects based on their various activities according their malicious intent of some. The paper should include some examples of the cybercrimes in IoT and their solution.

Also, the paper will include a literature review part, where we will be critically analyzing existing literature in when it comes to digital forensics methods in relation to IoT and discuss how our approach will differ or build upon the previous work. Furthermore, we wi

Nanotechnology in Drug Delivery

Kindly follow the headings below:

1) Introduction: overview of Nanotechnology in Drug Delivery

2) Impact of Nanotechnology in Drug Delivery (Comparison of drug delivery with and without Nanotechnology) + Advantages and Disadvantages

3) Nanotechnology in Drug Delivery for CANCER treatment

4) Nanotechnology in Drug Delivery for two other diseases (Please specify)

5) Conclusion: Summary of the whole writing.

PLEASE USE SIMPLE ENGLISH. THANK YOU!

Forensically Investigating IoT Related Crimes

Forensically Investigating IoT Related Crimes
Instructions:

Our research project is about how digital forensics science plays an important role in investigating and acquiring evidence that will help in resolving the cyber crimes which are related to Iot.

The paper will have an introduction which will give a brief glance of what is digital forensics and what is cybercrimes, it will also address different methods used in forensically conducting an investigation, it will also give examples of how digital forensics helped to identify suspects based on their various activities according their malicious intent of some. The paper should include some examples of the cybercrimes in IoT and their solution.

Also, the paper will include a literature review part, where we will be critically analyzing existing literature in when it comes to digital forensics methods in relation to IoT and discuss how our approach will differ or build upon the previous work. Furthermore, we wi