Categories
C++

Utilize the simple example. https://llimllib.github.io/bloomfilter-tutorial/Link

Utilize the simple example.
https://llimllib.github.io/bloomfilter-tutorial/Links to an external site.
with example hashes http://www.partow.net/programming/hashfunctions/ Links to an external site. Insert 4 names into the bit vector.
Test to see how well it performs the look-up.
Now, create your own bloom filter in netbeans, just like the example.
Randomly choose names/randomly create names and pass through the filter.
How does the Prob of false positives compare with the calculated.
Submit here

Categories
C++

Directions: Please upload a zip file. PLEASE DO NOT COPY CODE FROM INTERNET, THA

Directions: Please upload a zip file. PLEASE DO NOT COPY CODE FROM INTERNET, THANK YOU.
The file should contain the following: a. All *.cpp and *h files
b. Screenshot(s) of the output/results by running your program.
c. Excel/Word file that summarizes and explains your execution results d. Within your source code, you should write down comments that describes the purpose, expected input, and expected output of each function. Inside each function, you may introduce comments to explain the logics of important lines of source code.
. All I need is source code that ends with cpp and h.
Objectives: Use the execution time recording source code learned from Section 1.4 (time.h) or (chrono) and compare the execution time of the following 5 implementations Introduce 1000000 (N) integers randomly and save them in a vector/array. Find the 100 (M) smallest elements using the following implementations. Note if your computer cannot handle 1 million elements, you may reduce the size. However, you are NOT allowed to reduce the size too small which result in insignificant execution time difference among all the algorithms. (code is not right if the execution time among 6 algorithms are insignificant).
1. Use quick sort and then print the 100 smallest elements.
2. Implement a Priority Queue implemented by the following 3 different approaches. Print the 100 smallest element.
a. Ordered array/vector
b. Heap using array/vector
c. Heap using binary tree (a heap constructed by tree nodes. If you linked list to construct a heap, you will get zero). You are required to implement the following functions insert and delMax for priority queue, of course, also including swim and sink functions (again, node based. Additionally, for the heap using binary tree, you are required to implement the following functions:
i. [Easy] A computeHeight function for heap binary tree that will return the height of the tree.
ii. [Easy] A computeLeaves function for heap binary tree will return the number of leaves of the tree.
iii. [Easy] A lookup(int key) function for heap binary tree that will return true if key is found in the tree and return false otherwise.
iv. [Mid] A sameLevel(Node* current) function that will return all the node pointers at the same level of current node (return a
vector*).
v. [Mid] A descendant(Node* current, Node* aNode) function that return true if aNode is current node’s descendant node. Otherwise, return false.
vi. [Hard] A isHeap function for heap binary tree that will return true is all subtrees satisfy heap properties (root has max value in each subtree and complete tree). Return false otherwise.
For each of the above implementations, please record their execution times for 5 times and then average the results (6 different kinds to find 100 smallest elements from 1 million or billion elements). Compare the difference of execution times and self-explain your findings (this may be asked in your final exam). Note your finding should be in a Word or Excel format that presents the results of 6 algorithms, each is executed 5 times. Include screenshots of execution results of your functions

Categories
C++

look at the lab and the file as well. the last part is what the outlook is sopp

look at the lab and the file as well. the last part is what the outlook is soppost to be if you have any questions let me know

Categories
C++

Provide a short discussion comparing stored/persistent XSS vs. reflected XSS att

Provide a short discussion comparing stored/persistent XSS vs. reflected XSS attacks.
Particularly, compare the preconditions, target victim group, attack execution timel line, and attack difficulty between the two attacks.