Create summary tables that address relevant factors related to COVID-19

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related coronaviruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights into these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

Policy, Legal, Ethics and Cmplc

 

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.

Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions

Assignment1010

 What kind of user training should be conducted to deal with the issue of noise (not the electrical kind). How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  

PLEASE USE THE ATTACHED TEMPLATE

Building an AI machine/Deep learning application

 

  1. Part 1 –
    1. Following is the link of the Project and Dataset :

https://www.analyticsvidhya.com/blog/2016/06/quick-guide-build-recommendation-engine-python/

MovieLens 100K Dataset

  1. Run the code several times and show the intended output…you also need to EXPLAIN the output…
  2. You will also need to provide output for the following:
    1. Python file containing your code…
    2. Dimensions of the data…
    3. Sample of the data…
    4. Statistical summary of the data…
    5. Class distribution…
    6. One univariate and one multivariate diagram…
    7. Decision Tree…explain the best depth and why?…
    8. Results of training and new data, 80%-20% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
    9. Results of training and new data, 50%-50% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
  3. Part 2 – Updated Code…
    1. Now that you have a working base of code, let’s apply it to a “real world” scenario…
    2. Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…
    3. Update the original application so that it “works” for the NEW application…
    4. In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…
    5. YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.
    6. Run the code several times and show the intended output…you also need to EXPLAIN the output…
    7. You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:
      1. Python file containing your code…
      2. Dimensions of the data…
      3. Sample of the data…
      4. Statistical summary of the data…
      5. Class distribution…
      6. One univariate and one multivariate diagram…
      7. Decision Tree…explain the best depth and why?…
      8. Results of training and new data, 80%-20% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…
      9. Results of training and new data, 50%-50% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…

I Need Both Should be in 2 Separate documents.

Question 1: 

 

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s the aftermath. Comment on ways the attack could have been prevented.  Explain between 200 and 300 words.

 

Question 2 :

Write an essay of at least 500 words discussing how a blockchain implementation would improve data security in the military, education, or another context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered, or another list format.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Health Informatics & Inform System – Assignment 4

1.       Discuss at least 3 reasons for using CPOE (computerized patient order entry) (Refer to Article 1 and 2 of the resources. Consider both when building your arguments. feel free to use your own or researched examples if needed).

2.       There are many different EMRs available in the marketplace. What attributes of an EMR make it more suitable than the others for each of the following sizes of practice (a set of attributes for each size practice below):

  • small practices,
  • large multi-specialty groups or community hospitals, and
  • multi-hospital systems?

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.

COMPUTER

 

  • This assignment must be in APA format. 
  • The assignment should be in paragraph form using complete sentences and avoiding bullet points and numbered list.
  • Use a Level 1 heading to separate your sections (Page 47 of the APA Publication Manual).
  • Title and reference pages do not count toward the total word or page count. 
  • Textbook and outside sources need to be referenced and cited in the paper.

Essays: (at least 300 words per prompt)

1. How is the Gram stain used to classify bacteria? How do antibiotics inhibit the growth of bacteria? Explain how carriers play an important role in the transmission of pathogens. Jan acquired a MRSA infection during a stay at a rehabilitation facility. Jan’s physician tells her that her MRSA was caused by S. aureus. How would you explain to Jan what S. aureus is and how it can cause diseases?

2. Lou had abdominal surgery. During his stay at the hospital a catheter was inserted into his bladder. After returning home Lou was diagnosed with a nosocomial infection. What are the principle routes of transmission of nosocomial infections? What can be done to prevent nosocomial infections? What are three reasons why rates of nosocomial infections are markedly higher in developing countries? What are five things that increase the risk of nosocomial infection?

3. What is the difference between a neoplasm, benign tumor, and malignant tumor? Identify four chronic infections that may cause cancer, and what cancer the infection might cause. Mr. Brown age 63 and Mrs. Brown age 61, are being seen in for a routine check-up. What cancer screenings should Mr. and Mrs. Brown receive (name at least 3 and why)?

4. In Western societies, why is colorectal cancer the most common cancer, but yet there has been a decline in the incidence and mortality of cervical cancer over the last 40 years? Identify and discuss four nonspecific warning signs of cancer and which cancer the warning sign is linked to. Aaron is a 28-year-old who had an EBV infection during high school. He noticed one of his lymph nodes in his neck is swollen but is not painful. He is also experiencing night sweats. What is a possible diagnosis? Give some possible treatments for this diagnosis?

Security Architecture & design

Length:  Minimum of 600 words

Total points: 10 points

Due date: Sunday, 11/22/2020 by 4:00PM EST

Simple, Noplagarism

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Provide your thoughts and understanding of requirements:
1. Who consumes requirements?
2. Getting security requirements implemented.
3. Why do good requirements go bad?