Discipline: Computer science

FedRec+: A Federated Learning based Solution for Appliance Identification using Power Data in HouseholdsFedRec+: A Federated Learning based Solution for Appliance Identification using Power Data in Households

I’m supposed to re-implement the following paper: https://arxiv.org/abs/2209.01338The paper suggests exploring future directions such as providing theoretical guarantees for FedAR+, identifying alien appliances (unseen appliances in the training data), and detecting malicious clients that may attempt to compromise the federated learning process.   I would like to present a research paper which either implements any of the […]

Privacy Loss in the Digital Age and Its Implications for Data Protection Laws in Canada, the U.S., and EuropePrivacy Loss in the Digital Age and Its Implications for Data Protection Laws in Canada, the U.S., and Europe

Research Questions: How do different fields of occupation contribute to the erosion of privacy in the digital age? What role do corporations play in the erosion of privacy, and how can regulatory frameworks hold them accountable? How do data protection laws in Canada, the U.S., and Europe differ in their approach to safeguarding individual privacy? […]

Computer Science Career Landscape Evolution and the Key Factors Driving this ExpansionComputer Science Career Landscape Evolution and the Key Factors Driving this Expansion

Individuals pursuing education and careers in computer science can understand the factors driving this remarkable evolution in the field, adapt to technological advancements, and explore potential occupations. Some key factors driving this advancement of technology include machine learning, artificial intelligence (AI), and the Internet of Things (IoT). Understanding these key factors, future computer science professionals […]

Quantum Computing in Real-World Cryptographic Protocols: An Analysis of Near-Term FeasibilityQuantum Computing in Real-World Cryptographic Protocols: An Analysis of Near-Term Feasibility

Abstract A concise summary of the research question, methodology, key findings, and implications. 3. Introduction Background Information: Briefly introduce quantum computing and its potential implications for cryptography. Problem Statement: Define the gap in current research regarding near-term quantum computing’s impact on real-world cryptographic protocols. Research Objectives: Clearly outline the objectives and goals of your research. […]

System Requirements Document for Donation Management System Friends of the LibrarySystem Requirements Document for Donation Management System Friends of the Library

This project requires each team to select a website that needs a major data-focused enhancement such as an online ordering system or registration system.  The members of the team must agree on the site and create a systems requirements document and presentation.  If you cannot find or agree on a website then you should use […]

What are the essential differences and benefits when you compare Design Thinking with Requirements Engineering (RE), and how do agile methods come into play?What are the essential differences and benefits when you compare Design Thinking with Requirements Engineering (RE), and how do agile methods come into play?

The research question is: What are the essential differences and benefits when you compare Design Thinking with Requirements Engineering (RE), and how do agile methods come into play? Two sources are provided but i need at least 6 in total. Provided sources:  Gruhn, V. & Striemer, R. (2018). The Essence of Software Engineering. Springer Nature. https://doi-org.pxz.iubh.de:8443/10.1007/978-3-319-73897-0 […]

D2 Term Project Progress Report (evaluating a system built using a singleboard computer)D2 Term Project Progress Report (evaluating a system built using a singleboard computer)

At this point you must have acquired and installed all the software and hardware needed and should have made some progress in developing the code needed. You need to include proof that you have acquired the board and any hardware needed.The report will describe the status of the project. You should also mention which attribute […]

A Comprehensive Literature Review on Monocular Depth Estimation Using Deep Learning, with Emphasis on Transformer-Based ArchitecturesA Comprehensive Literature Review on Monocular Depth Estimation Using Deep Learning, with Emphasis on Transformer-Based Architectures

Write a detailed research paper review on “Monocular Depth Estimation using Transformer Architectures.” Ensure to use numbered references for information and include as many scientific papers as possible for credibility. Incorporate a comparative analysis table of transformer-based architectures based on existing scientific papers. 1. Introduction Overview: Provide a broad introduction to monocular depth estimation and […]

Consider the following list: 6, 2, 11, 7, 24, 4, 16, 9, 20 The list needs to be searched for the target: 9. You are, however, only given two possible options to search the list: Linear Search and Binary Search.Consider the following list: 6, 2, 11, 7, 24, 4, 16, 9, 20 The list needs to be searched for the target: 9. You are, however, only given two possible options to search the list: Linear Search and Binary Search.

Consider the following list: 6, 2, 11, 7, 24, 4, 16, 9, 20 The list needs to be searched for the target: 9. You are, however, only given two possible options to search the list: Linear Search and Binary Search.

Excel Module 5: Generating Reports from Multiple Worksheets and Workbooks, Training + SAM Project AExcel Module 5: Generating Reports from Multiple Worksheets and Workbooks, Training + SAM Project A

***NEED FULL ACCESS TO MICROSOFT EXCEL*** Please take the training module first, then complete the SAM Project A (both tie hand in hand together, you need to complete the training first then do the SAM PROJECT A by following the instructions in the training step by step).  For the SAM Project A, please complete in […]