Computer Science
Algorithm Mathematics | Instant Homework Solutions
RSA Cryptography Note: Anyone taking the lecture can prefer this option (Yes, previous grading policy has changed!). As you know, 1st option is participating in online lectures actively and answering questions anytime your name is picked from the list. RSA (RivestShamirAdleman) is a public-key cryptosystem that is widely used for secure data transmission. In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers. For more please visit: RSA (cryptosystem) – Wikipedia 1. Find a working RSA implementation source code that can work with arbitrarily large integers, that means integers can have 1000 or more decimal digits. An open source code that you can use is given here: GitHub – abdallahelattar/RSA-and-Big-Numbers-Implementation: RSA Encryption and Decryption using Public and Private keys including other operations. (This code works in Visual Studio (C++ empty project), but there is no clear explanation of functions used. Some large primes having more than 100 digits are provided in the Rea_Me file.) 2. Run the code and in a video, explain how the core algorithms in RSA are coded. a. Explain general RSA algorithm b. Explain primality test algorithm c. Explain modular exponentiation algorithm Use Free screen recorder, video editor for Windows & macOS (atomisystems.com) for video recording. Recording must show your face in the corner. 3. Find an alternative for modular exponentiation algorithm. You can start form here: iscturkeyHaticeKübraGüner.pdf Code it as an alternative function. Compare the original algorithm in your original code with this one, based on running time in seconds, for numbers having more than 150 decimal digits. In your video explain your alternative algorithm. Give complexities for both algorithms and give running time results. Submission material. 1. Source Code 2. Link for downloading the video (Video must be 30 minutes, at least. It must show your face. Otherwise your submission will not be valid.) 3. Report
Cyber Espionage | Instant Homework Solutions
Cyber espionage has become common in the last decade. Can you name at least two cyber espionage incidents that occurred in 2019-2020? Do you believe the United States plays a key role in cyber espionage?
Cybersecurity Engineering | Instant Homework Solutions
This is admission essay to Augusta University GA – Cyber-security Engineering major Below subject of essay I have choose and needs to be 650 words maximum (can’t be shorter than 250): Some students have a background, identity, interest, or talent that is so meaningful they believe their application would be incomplete without it. If this sounds like you, then please share your story.
Relational Database | Instant Homework Solutions
For decades, relational databases remained essentially unchanged; data was segmented into specific chunks for columns, slots, and repositories, also called structured data. However, in this Internet of Things (IoT) era, databases need to be reengineered because the very nature of data has changed. Todays databases need to be developed with the needs of IoT in mind and have the ability to perform real-time processing to manage workloads that are dynamic. For example, relational databases should be able to work with real-time data streaming and big data (an example was presented in the Unit III Lesson). Scenario: Falcon Security wants their customers to be able to view security video footage in real-time and provide customers with the ability to query video footage for viewing. Choosing a database solution such as MongoDB would allow Falcon Security to store customer video footage in the same database as the metadata. To do this, Falcon Security needs a way to manage the demands of real-time data streaming for real-time analytics. Conduct some research for a NoSQL database application, such as MongoDB or Cassandra, that could meet this need. How would switching to a real-time database solution help Falcon Security remain competitive? Create a PowerPoint presentation that includes the components listed below. Provide a brief introduction to IoT. Present the argument to the Falcon Security CEO that switching to a more dynamic database structure (NoSQL real-time database) will meet the demands of IoT. Introduce some features of the database you chose, whether it is MongoDB, Cassandra, or another database. Describe how switching to a more dynamic database will give Falcon Security a competitive advantage. Your presentation must be a minimum of six slides in length (not counting the title and reference slides), and you must use at least two academic resources. Any information from a resource used must be cited and referenced in APA format.
Software Evaluation | Instant Homework Solutions
The Best Free Software: Instructions: Describe five separate software and submit the following information: Submission Instructions: Software Name: Category (System, Utility, or Application) Purpose: Describe what features the software provides, and why you would use or currently use the software. (Not all users take advantages of all software features.) Opinion: Your opinion of the software. You may use any word format to document your assignment, i.e., text or tables. Please note: An application software improves users’ productivity and supports the tasks. Utility software (also known as service program, service routine, tool, or utility routine) is a type of computer software; it is specifically designed to help manage and tune the computer hardware. The operating system, also known as system software, manages the computerI like to call it the “BOSS” of the computer system. I hope this explanation offers further level of distinctions among software programs.
Information Security and Cyber Crime | Instant Homework Solutions
Instructions: It is essential for organizations to have plans and procedures in place in order to both prevent crises and recover from them. Crisis preparedness involves protecting against fires, using computer forensics, and creating and maintaining a disaster recovery plan. What is a disaster recovery plan? What role do computer forensics play in a disaster recovery plan? Using the Internet, locate a disaster recovery plan for an organization of your choice. What issues does this plan address? Is anything missing? In a 1- to 1½-page Word document, write a paper in the following format: Paragraph 1: Introduction to the purpose of this paper. Paragraph 2: Describe the components of a disaster recovery plan. Paragraph 3: What role do computer forensics play in a disaster recovery plan? Paragraph 4: Summarize the disaster recovery plan you found. What issue does this plan address? Is anything missing? Paragraph 5: Conclusion
Robotics Exam | Instant Homework Solutions
1) Name two types of contact sensors and four types of non-contact sensors. 2) What advantages do non-contact sensors have over contact type sensors? Disadvantages 3) Which type of lighting (front or rear) is easier to set up for part inspection/identification using total surface area as the primary indicator? Why? 4) When using a front lighting system, what pitfalls or obstacles could be encountered (name three)? 5) What problems would be encountered in setting up an inspection system to identify clear acrylic parts? Explain what can be done to overcome these issues. 6) Draw an electrical schematic of a shunt wound DC electrical motor with shunt field speed control. Label all parts. 7) Even though a series wound DC motor has poor speed control, why would it be preferred as an actuator for a robotic wrist joint? 8) What is the formula or explanation of synchronous speed as given for an AC induction motor? (either will do) 9) In an AC motor, what is the term motor slip referring to? 10) What is the maximum theoretical synchronous speed of an AC motor with four stator coils? 11) Why is shunt field control of a DC motor preferred over armature control? 12) Explain the following Fanuc Robotic Vision Program: 1: UFRAME_NUM=5; _______________________________________________ 2: UTOOL-NUM=2; _________________________________________________ 3: J P[1] 100% FINE; ________________________________________________ 4: VISION RUN_FIND VISIONPASSFAIL; ___________________________________________________ 5: VISION GET_OFFSET VISIONPASSFAIL VR[1] JMP LBL [25]; _______________________________ 6: L P[2] 250mm/sec FINE Tool_Offset, PR[10:APRCH] VOFFSET, VR[1]; ___________________________ 7: L P[2] 500mm/sec FINE VOFFSET, VR[1]; _________________________________________ 8: PAUSE; ______________________________________________ 9: L P[2] 500mm/sec FINE Tool_Offset, PR[10:APRCH] VOFFSET, VR[1]; ___________________________ 10: LBL[25]; ____________________________________________ 11: J P[1] 100% FINE; __________________________________________ What are the names of your two Fanuc robotic programs programs: #1) _________________________________ #2) _________________________________
Develop a Python Application | Instant Homework Solutions
Develop a Python application that incorporates using appropriate data types and provides program output in a logical manner. Your program should prompt a user to enter a car brand, model, year, starting odometer reading, an ending odometer reading, and the estimated miles per gallon consumed by the vehicle. Store your data in a dictionary and print out the contents of the dictionary. Python has built-in string validation methods for basic data. It can check if a string is composed of alphabetical characters, alphanumeric characters, digits, etc. str.isalnum() This method checks if all the characters of a string are alphanumeric (a-z, A-Z and 0-9). print(‘ab123’.isalnum()) True print(‘ab123#’.isalnum()) False str.isalpha() This method checks if all the characters of a string are alphabetical (a-z and A-Z). print(‘abcD’.isalpha()) True print(‘abcd1’.isalpha()) False str.isdigit() This method checks if all the characters of a string are digits (0-9). print(‘1234’.isdigit()) True print(‘123edsd’.isdigit()) False str.islower() ( This method checks if all the characters of a string are lowercase characters (a-z). print(‘abcd123#’.islower()) True print(‘Abcd123#’.islower()) False str.isupper() This method checks if all the characters of a string are uppercase characters (A-Z). print(‘ABCD123#’.isupper()) True print(‘Abcd123#’.isupper()) False Assignment Instructions Write a Python program that performs the following tasks: Read from the console an arbitrary string S of length less than 50 characters. In the first output line, print True if S has any alphanumeric characters. Otherwise, print False. In the second line, print True if S has any alphabetical characters. Otherwise, print False. In the third line, print True if S has any digits. Otherwise, print False. In the fourth line, print True if S has any lowercase characters. Otherwise, print False. In the fifth line, print True if S has any uppercase characters. Otherwise, print False. Develop Python code that implements the program requirements.
Boolean Algebra and Number Systems | Instant Homework Solutions
Complete the following in a paper of 12 pages: Simplify the following Boolean expression: AB(A + B)(C + C) Design the combinatorial circuit for: (p *r) + q Design the combinatorial circuit for: Complete the truth table of the following Boolean expression: Prove or disprove that the following 2 expressions are equivalent. Use either the related laws for your proof, or complete the two truth tables: (A + C)(AD + AD) + AC + C A + C The following is a message coded in ASCII using one byte per character and then represented in hexadecimal notation. What is the message? 4469736372657465204D617468656D617469637320697320434F4F4C21 Convert each of the following signed binary byte representations to its equivalent base-ten representation. What would each byte represent in Binary Coded Decimal? Show your work step by step. 00010001 01011100 1111010 What is the signed binary sum of 1011100 and 1110101 in decimal? Show all of your work. Convert each of the following base-ten representations to its equivalent twos complement in 7 bits. Show all of your work. 12 -2 -8 0 Define the highest and lowest integer that can be represented in this 7-bit twos complement representation. What bit patterns are represented by the following hexadecimal notations? Show all of your work. 9A88 4AF6 DA What is the hexadecimal sum of 9A88 and 4AF6 in hexadecimal and decimal? Show all of your work.
Cloud Storage Forensics | Instant Homework Solutions
Overview The key to being a good forensic investigator and security expert is understanding the field. This includes not only understanding current security topics, but understanding also understanding tools and concepts used in past. Understanding both prepares for the future. The purpose of the research paper is to allow students the opportunity to hone their research and reporting skills by studying a security topic. Assignment Students will pick a research topic to study and report on. The topic must be related to the field of cyber security and have specific application to the study and application of digital forensics. The topic must be approved by both instructors. Research is not intended to create new developments in the field, but to allows students to create a deeper knowledge and insight into digital forensics and cyber security. The paper should consist of solid research, citing at least six sources. Wikipedia sources are allowed, but must be backed by verified experts. The paper should be written in the IEEE standard. (Template included) Research should show that students have a solid understanding of their selected topic as it relates to digital forensics. This should include a section on background research and a section on how the topic has been used in the field, or potential future work. In writing the paper, the final document should contain a title page consisting of your name, topic, class name, and date of submission. Additionally, each paper should include an abstract, introduction, body paragraphs, conclusion, and references. The paper should be approximately five to seven pages in length, excluding the title page. Comments made my teacher after first attempt: There were numerous grammar mistakes that showed me this was not proof read before you turned it in. The formatting was also not in IEEE standard, and you went overboard on the use on images. You also went past the 7 page maximum length requirement. After the first page I stopped pointing out every single error because it would have taken too long. The technical content of your report was also severely lacking. You primarily talked about the different things you can find on different cloud services, but didnt focus on why these things are important enough.
Use Promo Code: FIRST15