Discipline: Computer science

(CO-6: Develop a policy to analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace)(CO-6: Develop a policy to analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace)

You are tasked as the Cyber Security Analyst at your new organization to prepare a briefing for executive management (comprised of people with anywhere from a basic understanding of Information Technology [IT] to a Chief Information Officer with a vast knowledge of IT). The purpose of the briefing is to let them know after you […]

(Please read through instruction) – using yolov8 with embedded ResNet to detect human pose(Please read through instruction) – using yolov8 with embedded ResNet to detect human pose

Report format: Write a report with >1,500 words including main sections: a) abstract, b) introduction, c) method, d) experiment, e) conclusion, f) bonus points (see below) and g) references. You can follow the paper format as e.g leading machine learning journals such as Journal of Machine Learning Research (http://www.jmlr.org/) or IEEE Trans. on Pattern Analysis […]

Empowering e-learning platforms with llm(s) such as chatgpt, bard and advanced nlp: a new era of ai-driven educationEmpowering e-learning platforms with llm(s) such as chatgpt, bard and advanced nlp: a new era of ai-driven education

  Project details Title: Empowering E-Learning Platforms with ChatGPT, Bard and Advanced NLP: A New Era of AI-Driven Education. Description: The e-learning landscape is rapidly evolving, with learners seeking more interactive and personalized educational experiences. This research delves into the integration of advanced NLP models, such as ChatGPT and Bard, into elearning platforms, aiming to […]

NDG Security+ V3: Lab 15 Working with Android, Lab 06: Wireless Networking Attack and Mitigation TechniquesNDG Security+ V3: Lab 15 Working with Android, Lab 06: Wireless Networking Attack and Mitigation Techniques

 Submit the following in a Word document: 1. Submit a Lab Reflection (In your own words). Four paragraphs. Paragraph 1: Describes the purpose of the lab. Paragraph 2: Discusses how the topic in this lab would be used in a real-world environment.Paragraph 3: Describe how the lab went for you, including any problems you may have experienced. […]

Explore the ethical implications of artificial intelligence (AI) and discuss its impact on society and daily life.Explore the ethical implications of artificial intelligence (AI) and discuss its impact on society and daily life.

Essays must be written in English Students may submit 1 entry per subject category. Students are permitted to enter more than one subject competition Submit essays as PDF or Microsoft Word files References must be in Harvard Referencing Styleand included in the word count of maximum 1500 words (Minimum is 1000.)  essays must be 1000 […]

Navigating the Depths: A Comprehensive Study on Data Security and Privacy Issues in E-commerceNavigating the Depths: A Comprehensive Study on Data Security and Privacy Issues in E-commerce

  *orange highlight indicates that it has already been done.   l Title A Comprehensive Study on Data Security and Privacy Issues in E-commerce   KEYWORDS: E-commerce, Data Security, Privacy Protection, AES (Advanced Encryption Standard), RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), Hash Functions, Bloom Filters, Homomorphic Encryption, Data Privacy   l Introduction Background and Context: 1. Introduce the dynamic […]

“Addressing Data Management Challenges in Healthcare: A focus on Preventing Never Events.”“Addressing Data Management Challenges in Healthcare: A focus on Preventing Never Events.”

Identify and Remove Redundancies: Look for repetitive phrases, redundant information, or duplicated ideas within the paper. Remove any unnecessary repetition to streamline the content and improve clarity. Consolidate Similar Ideas: If you find multiple sections or sentences that convey similar information, consider consolidating them into a single, more concise statement. This helps to avoid unnecessary […]

Comparative Analysis of Pre-trained Machine Learning Models for Image-to-Text GenerationComparative Analysis of Pre-trained Machine Learning Models for Image-to-Text Generation

Objective:  This literature review aims to analyze, compare, and summarize the performance and efficiency of selected pre-trained machine learning models that specialize in generating relevant text descriptions from images. The review will focus on evaluating these models against a set of numerical metrics to determine their capabilities and limitations in real-world applications. Scope: The review […]

AI-Generated Alternative Text Suggestions for Images in Moodle: Enhancing Web Accessibility for Visually Impaired UsersAI-Generated Alternative Text Suggestions for Images in Moodle: Enhancing Web Accessibility for Visually Impaired Users

The enclosed documents pertain to the proposal and the desired structure of the thesis, which focuses on developing a plugin for the Moodle forum system that utilizes a large language model. This Thesis focuses on comparing newest pretrained Image to Text Models UForm (unum-cloud) InstructBLIP-Vicuna13B CLIP-Interrogator Img2Prompt LLaMA-13B LLaMA-7B BLIP-2 OpenAI GPT-4-Vision-Preview Some of the Evaluation […]

CO-4: Prepare a plan to design functions that encompass scoping a program or developing procedures, processes, and architectures that guide work execution at the program and/or system level)CO-4: Prepare a plan to design functions that encompass scoping a program or developing procedures, processes, and architectures that guide work execution at the program and/or system level)

See this Web Site: http://www.faulkner.com.ezproxy2.apus.edu/products/securitymgt and read the Geoff Keston article titled “Developing A Security Communications Plan”. According to Keston (2013), “A mark of a mature security communications program is the shift away from one-time messages, such as ad hoc emails. Such messages are easily forgotten and are often hard to find after a few weeks. A […]