Survey of a topic: Proof of stake literature

English, IEEE
Survey of a topic: Proof of Stake LiteratureThe report should be a maximum of 8 pages in any format. You should summarize the subject with an introduction, explaining very clearly what the research problem is and how you willaddress it. The technical details of the results should be explained. Good venues that publishresearch in this area include but not limited to IEEE Security & Privacy, ACM CCS, USENIXSecurity, NDSS, CRYPTO, ASIACRYPT, EUROCRYPT, Financial Cryptography, BITCOINWorkshop, Blockchain Protocol Analysis and Security Engineering
Read More

Contingency Planning

English, IEEE
Look for information on incident response on your institutions Web site. Does your institution have a published plan? Identify the areas in an academic institutions contingency planning that might differ from those of a for-profit institution.
Read More

propose a framework which can provide best privacy and trust system against attacks using blockchain and federated learning

English, IEEE
I need a unique research paper which will provide a framework using algorithms( program) to prove that existing models are not good and provide a new model using blockchain and federated learning along different models to provide multilayer security and trust system to enhance the working capcity of model. And protect system using 3rd party from attacks. For example blockchain have down points towards security and this paper should bring it up and prove that element by providing examples, programs, graphs and comparisons.
Read More

Machine Learning: Multimodal Learning

English, IEEE
A short/concise foundational chapter on Multimodal Learning to be included in a dissertation.Starting point: https://arxiv.org/pdf/1705.09406.pdf (Chapters 1 & 2)https://heartbeat.fritz.ai/introduction-to-multimodal-deep-learning-630b259f9291https://towardsdatascience.com/multimodal-deep-learning-ce7d1d994f4Prefered format: Latex arxiv (https://pt.overleaf.com/latex/templates/style-and-template-for-preprints-arxiv-bio-arxiv/fxsnsrzpnvwc)References format: bibtex (external .bib file)
Read More

Operating System Performance Evaluation and Analysis AND DESIGN

English, IEEE
IMPORTANTREFERENCES IEEE AND ACM JOURNALS OR CONFERENCES ONLY 6 SOURCES FROM RESEARCH PAPERS SOURCES ONLY 5 YEAR OLD NO TRADE JOURNALS OR WEBSITES STEPS FOCUS ANALYSISEVALUATION FUTURE USE OR METHODOLOGIES SIGNIFICACE IN THE INDUSTRYMETHODS EVALUATIONTOOLSCONSISTENCE FLOW ACCURACY , ANALYSIS AND SYNTHESIS REWRITE 10 PAGES REWRITE THE TITLE WRITING START ON THE FIRST PAGE EXAMPLES:"UTILIZING [TOOL] TO MEASURE [OPERATING SYSTEM COMPONENT] [FOCUS]DEADLOCKS[IMPLEMENTATION][WHY IT MATTERS ]FOCUS ON PARTICULAR COMPONENT OF AN OPERTAING SYSTEM[TASK MANAGEMENT] FOCUS[THREADS][TOOLS]TO ATTAIN SOFT/HARD GOALS IT MATTER IN INDUSTRY [REASON] HOW THIS IS TARGETED IN REAL INDUSTRIES OR ESPECIFIC ENVIROMENTSREAD MY ATTACH PAPER . REWRITE AND ORGANIZE IDEAS , ALSO REVIEW SOURCES AND ADD 3 MORE NOT REALTED WITH DEADLOCKS , i ALREADY HAVE A LOT FROM DEADLOCKS i NEED MORE REFERENCES ON SYNCRONIZATION ISSUE SCODING SNIPPETS SHOULD LOOK GOOD LIKE THE BLACK ON MY SAMPLE 
Read More

philosophy- explaining ethical theories of some philosophy

English, IEEE
Read the following thought experiment from Philippa Foot and then write an essay that answers the questions that follow:Let us consider [] a pair of cases which I shall call Rescue I and Rescue II. In the first Rescue story we are hurrying in our jeep to save some people let there be five of them who are imminently threatened by the ocean tide. We have not a moment to spare, so when we hear of a single person who also needs rescuing from some other disaster we say regretfully that we cannot rescue him, but must leave him to die. To most of us this seems clear []. This is Rescue I and with it I contrast Rescue II. In this second story we are again hurrying to the…
Read More