Machine Learning Iris

Write a program to apply Machine Learning classification models to Iris flowers dataset. Follow the steps:

1.Download the iris.csv file (example: https://gist.github.com/netj/8836201). From this file the label (target) is defined with the ‘variety’ column and the features with ‘epal.length’, ‘sepal.width’, ‘petal.length’, ‘petal.width’ columns.
2.Preprocess the iris.csv file by label encoding the target ‘variety’ column.
3.Apply the following Machine Learning classification models: K Nearest Neighbors and Random Forests
4.Calculate the following classification metrics to validate the model: Accuracy Score, Confusion Matrix and Classification Report.
5.Explain how the program works and compare these two classification models.

Make you follow all of them so you don’t lose any grade points because of that. Feel free to contact me for any questions you may have.

Discuss the impact of cloud processing environments on application security. Be sure to define cloud computing, application security, and the various types of implications.

  

The paper is to be between 2,000 and 2,500 words. 

It must be formatted using APA style. 

A least five scholarly resources must be utilized. Scholarly resources include journal articles in peer reviewed journals, textbooks, and Educational and Government websites. Wikipedia, message boards, blogs, and commercial websites are not scholarly. While you can cite a commercial website, it will not count as one of the scholarly sources. The paper will be evaluated using plagiarism scanning technology, so be careful to include citations and follow APA procedures when dealing with direct quotes. It is expected that one of the five sources will be your text.

  

The PowerPoint should support a 10-minute presentation. 

Avoid slides with many words on it. 

One tip is to not use a font smaller than 20 point. 

Ensure that you have enough slides to address the topic, 

Do not go over the 10-minute limit.

Include a slide that discusses who wrote what, and who presented what

EH week10 DB

 

Hello,

i need this paper by 10/28 afternoon.

Strictly No plagiarism please use your own words.

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided? 300-350 words.

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

IT345 8B

 

Find a recent article that relates to a software that has malfunctioned and caused either serious injury, death, or loss of revenue. Summarize the article and discuss whether you believe this will impact the adoption of this type of technology.

Post your reply  at midnight. Your response should be at least 250 words and appropriately cite your resources.

Paper 7

 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 13 and 14.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 13 and 14 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Go to cloudera.com, MapR.com, hortonworks.com, or marklogic.com or in combination to find at least three customer case studies on Hadoop implementation, and then discuss the commonalities and differences of these cases.
  2. Search the job search sites like monster.com, careerbuilder.com, and so forth. Find at least five job postings for data scientist. Identify the key characteristics and skills expected from the applicants and based on what you are learned in this class, how high is your motivation now to seek these types of career choices?
  3. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions (Part 1)

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  Overall Course Conclusions and Reflection (Part 2)

After the primary conclusion of this paper, extend this conclusion into an overall class conclusion and reflection providing at least 500 additional words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current or future work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Paper Section 5:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Week 15 Discussion

 Discussion  (Chapter 13): Research  Apple Home Pod. How does it interact with smart home devices?  Alexa is  now connected to smart home devices such as thermostats and microwaves.  Find examples of other appliances that are connected to Alexa and write a  report.