Discipline: Computer science

Design and Formal Verification of a Byzantine-Resilient, Privacy-Preserving, Federated Learning Protocol for Adversarial EnvironmentsDesign and Formal Verification of a Byzantine-Resilient, Privacy-Preserving, Federated Learning Protocol for Adversarial Environments

Objective: Design, implement, and formally verify a novel federated learning protocol that is simultaneously: Resilient to Byzantine participants, Resistant to poisoning and backdoor attacks, Fully homomorphically encrypted or alternatively employs secure multi-party computation (SMPC), Guarantees differential privacy for clients’ data, Operates over a dynamic, unreliable network (e.g., mobile edge devices or IoT nodes), And is […]

Cross-Layer Compilation Pipeline for a Self-Reconfiguring Heterogeneous System with Dynamic ConstraintsCross-Layer Compilation Pipeline for a Self-Reconfiguring Heterogeneous System with Dynamic Constraints

Objective: Design and partially implement a static-to-runtime compilation system for a simulated heterogeneous hardware environment where node configuration, instruction scheduling, and memory boundaries shift non-deterministically within preset but undocumented constraints.*** Compiler Design Requirements: Develop a modular compiler framework that supports both ahead-of-time and just-in-time compilation. It must: Convert a subset of ANSI C and embedded […]

GUI Design – In this assignment, you create a page design for a tablet device that confirms a customer’s bill payment.GUI Design – In this assignment, you create a page design for a tablet device that confirms a customer’s bill payment.

Overview In this assignment, you create a page design for a tablet device that confirms a customer’s bill payment. Preparation Download the Week 8 Assignment Template (attached). Use it to complete this assignment. Choose a graphic design software that will enable you to create a basic rendering of a GUI for a tablet device. Scenario […]

GlaucoViT: A New hybrid vision transformer and EfficientNetB0-based classification model for Glaucoma Diagnosis Using Fundus Images.GlaucoViT: A New hybrid vision transformer and EfficientNetB0-based classification model for Glaucoma Diagnosis Using Fundus Images.

đź“„ Assignment Instructions for EssayPro – Research Paper on Vision Transformers for Glaucoma Classification đź§  Objective: I am writing a research paper that proposes a novel Vision Transformer (ViT)–based model for Glaucoma classification. This paper is intended for submission to a high-impact Elsevier/IEEE/Springer journal. The current draft lacks proper structure, technical depth, coherence, formatting, and […]

Vers un Bloc Opératoire Augmenté : Prédiction et Optimisation des Flux Patients pour un Plateau Technique IntelligentVers un Bloc Opératoire Augmenté : Prédiction et Optimisation des Flux Patients pour un Plateau Technique Intelligent

il faut utiliser le reinforsment learning et l alorithme genetique pour fair e le ordennancement entre les operation les cherirgien et les patient dans un block Soit ce formalisme mathamtique DCOP: 1. Variables 1.1. Set of Medical Staff: M = {m1 , m2 , …. m|M|} Where M represents all medical staff members, including surgeons, […]

Handwritten Digit Classification Using CNN, MLP, and LeNet Architectures: A Comparative Study of CPU and GPU PerformanceHandwritten Digit Classification Using CNN, MLP, and LeNet Architectures: A Comparative Study of CPU and GPU Performance

https://colab.research.google.com/drive/1QibOywveHtaOjxldRCEg8ztrVwnM1nMc?usp=sharingHere’s a structured and professional **Title**, **Abstract**, and **Project Overview** tailored for your project comparing CNN, MLP, and LeNet models on custom MNIST digit images, including CPU vs GPU training benchmarks and real-time predictions:—### **Project Title****Performance Benchmarking of CNN, MLP, and LeNet Models for Handwritten Digit Classification on CPU and GPU using Custom MNIST Dataset**—### […]

Project Title: Protocol Analysis using Wireshark: Unveiling the Inner Workings of Network CommunicationProject Title: Protocol Analysis using Wireshark: Unveiling the Inner Workings of Network Communication

THE PROJECT IS ABOUT IP PROTOCOL Network Traffic Analysis: Use tools like Wireshark to capture and analyze network packets, understanding the flow of data and the different protocols involved. Key Concepts: TCP/IP Model: Understand the four layers (Link Layer, Internet Layer, Transport Layer, and Application Layer) and their respective functions. IP (Internet Protocol): Learn how […]

Injecting Failure into Serverless Architectures: A Framework for Chaos Engineering with AWS Lambda and Step FunctionsInjecting Failure into Serverless Architectures: A Framework for Chaos Engineering with AWS Lambda and Step Functions

Title: Injecting Failure into Serverless Architectures: A Framework for Chaos Engineering with AWS Lambda and Step Functions Abstract: Briefly explain the increasing adoption of serverless architectures and the importance of resilience. State the need for chaos engineering in serverless applications. Introduce your proposed framework for injecting controlled failure scenarios using AWS Lambda and Step Functions. […]

Injecting Failure into Serverless Architectures: A Framework for Chaos Engineering with AWS Lambda and Step FunctionsInjecting Failure into Serverless Architectures: A Framework for Chaos Engineering with AWS Lambda and Step Functions

Title: Injecting Failure into Serverless Architectures: A Framework for Chaos Engineering with AWS Lambda and Step Functions Abstract: Briefly explain the increasing adoption of serverless architectures and the importance of resilience. State the need for chaos engineering in serverless applications. Introduce your proposed framework for injecting controlled failure scenarios using AWS Lambda and Step Functions. […]

Hybrid Intrusion Detection System (H-IDS) for Mobile Cloud Computing: A Resource-Aware Multi-Layered ApproachHybrid Intrusion Detection System (H-IDS) for Mobile Cloud Computing: A Resource-Aware Multi-Layered Approach

Hybrid Intrusion Detection System (H-IDS) Mobile Device Layer (Lightweight Tasks) Use resource-efficient systems like Snort, OSSEC, and TShark. Focus on quick anomaly detection, monitoring resource metrics, and signature-based analysis. Cloud-Assisted Layer (Heavyweight Tasks) Deploy systems like Suricata, Zeek, or Apache Metron. Focus on machine learning-based analysis, deep packet inspection, and threat correlation. The Hybrid Intrusion […]