The secret key generation in physical layer security achievement through Reinforcement learning algorithms
problem is on the Robinson-F...distance for measuring the dissimilarity of two un-rooted phylogenies of degree 3. Implement Day's algorithm for computing this measure. see Fig. 8.8 of the textbook by Wing-Kin Sung for a formal algorithm and read Sec 8.3.1 of this textbook. I want to implement c code for that problem with very basic level programming.
I have a working c# desktop application to buy-sell Cryptocoin. I am also a member of a Telegram coin alert channel which sends name of coin pair and buy-sell values. I need a C# coder to implement auto buy/sell operation in Visual Studio (v 2017). Main flowchart of the software: 1) When a text message received from Telegram channel; trigger existing
We have SHA256 algorithm hash .. u can prepare a sha256 python script too If anyone can do it properly .. Will get hugr reward... Dont time passers please ! Dont time waste both of us .. Only exp. N serious expert need ... Thanks
We need to complete project of small questions in python on topics of data structures and algorithms
We have algorithm hash .. If anyone can do it properly .. Will get hugr reward... Dont time passers please ! Dont time waste both of us .. Only exp. N serious expert need ... Thanks
Hi dears, Need your assistance! We lost contact with our ex developer and now facing the problem with serials generation... Old software generate pairs serial/ hash like this one serial: 1006438049976566 hash: 10DD2AE6AACFF75230 We can provide lots of pairs like above if needed and any additional info on your request. All the best and thanks!
I have the algorithm needs to implemented in Matlab Make sure you are understand machine learning concepts, graph embedding, non negative matrix factorization. Contact me for detail about the project
I have a dataset of articles/blogs collected date wise from different political blogs.I want to perform topic modelling on these articles/blogs using NMF, LDA and Kmeans algorithm. I want to get the following results from these algos : 1) I want to perform topic modelling (TM) on these articles/document for each date separately and wants to identify/see
1. Using the ECLAT algorithm, mine the groceries dataset ([login to view URL]) for frequent item sets please do the following steps: 2. Make sure you preprocess the dataset before mining it. For example, convert the data to a format required by the ECLAT algorithm, … 3. Use comments to describe every step you do in your code 4. Try different support and confidence
...registry as a string, which is obviously easy. However, [login to view URL] is saved in binary, and I would love to be able to replicate the same encoding algorithm. I don't necessarily need to discover the decoding algorithm, because i don't really need it. But i want to be able to write myself new values in registry for the [login to view URL] field, so the original ap...
Implement the paper and get the results
...be developed for Linux using C. I am currently looking for someone to write a GUI application for Linux. The application is for a digital eye testing chart, like the one you see in optometrists when you 'read letters from the top line'. You would need to supply the complete source code including commenting written in C if possible. Please see the rough
I need a chatapp that uses a custom cryptographic algorithm