building an AI machine/Deep learning applicationPart 1 – Following is the link of the Project and Dataset :https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

 Part 1 –

Following is the link of the Project and Dataset :

https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data…

[9:28 PM, 12/10/2020] Mohammed Monroe: Part 1 –

Following is the link of the Project 

1. Iris Data Set

https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Part 2 – Updated Code…

Now that you have a working base of code, let’s apply it to a “real world” scenario…

Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…

Update the original application so that it “works” for the NEW application…

In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…

YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

                                                    (OR)

building an AI machine/Deep learning applicationPart 1 –

Following is the link of the Project and Dataset :

https://www.analyticsvidhya.com/blog/2016/06/quick-guide-build-recommendation-engine-python/

https://grouplens.org/datasets/movielens/100k/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Part 2 – Updated Code…

Now that you have a working base of code, let’s apply it to a “real world” scenario…

Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…

Update the original application so that it “works” for the NEW application…

In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…

YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

200-250 words

 Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it. 

 Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.  

Choose Only “ONE” question from these three, and write 4 pages Research Paper: 1.”The Mythology of Computers: The Early Day” OR 2. “Do You Know Where You Computer's Been? Protecting your Computer” OR 3. “Internet Freedom Versus Security: Who Wins?”

  Choose Only “ONE” question from these three, and write 4 pages Research Paper plus annotation: 

 1.”The Mythology of Computers: The Early Day”  

2. “Do You Know Where You Computer’s Been? Protecting your Computer” 

 3. “Internet Freedom Versus Security: Who Wins?”

Make sure to do all of the following:

  1. The annotated bibliography will contain six (6)sources using the MLA style for the reference citations. 
  2. Your sources must include at least one book, one article, and one web source. 
  3. Each source listed will also include a 3-5-sentence annotation that will describe the relevance between the information in the source and your topic. 
  4. Your annotations identify how the source relates to your topic. Spelling, grammar, and writing style will be evaluated. The annotated bibliography should be typed in MLA style, double-spaced with one-inch margins (top, bottom, left, and right). Include your name and page number in the header (top-aligned right); include your name, Prof. Name, Class Name, the date on the left side.  

Wireless Netwok 2

 

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers.   

Section one

Assignment Overview

Now that you have started to design a wireless network for your assigned institution, the requirements for the wireless network will be considered in the form of a Network Needs Analysis. 

All Case Studies

Directions: Refer back to the Design Document and complete the information in the “Network Needs Analysis” portion of the document. Consider the following when completing the “Network Needs Analysis” section:

Types of applications/services that will be used on the wireless network

Number of users the wireless network will have to support

Speed requirements for the wireless network

Estimate the load on the wireless network

Remember to address the needs of your assigned business setting when considering the requirements of the wireless network. While most businesses typically have the same setup, each individual institution has to be concerned about specific privacy issues, reliability, and security threats. Therefore, some additional research may need to be conducted for your assigned business.

1-2 pages with Reference

  Section two

Assignment Overview

When installing a wireless network, there are many components to consider, such as access points’ routing, switching, and effects on their OSI model. In this assignment, students will explore the different elements that need to be taken into consideration before installing wireless access points. 

  

Directions: Write a report (1–2 pages) to the company administration that explains how the design of the wireless network will help to avoid congestion on the network, as well as what components that need to be considered when installing access points. Consider the following when preparing this assignment: 

1. The area in which the site is located may interfere with the wireless signal.

2. IP wireless phones must always be in service.

a. Explain how routing, switching, and the physical /transport layers are relevant to wireless IP phones.

3. Construction workers and sales team members always need the up-to-date information in the system (i.e., the options that the customer chooses have to be correct).

with Reference

final project draft and main version

  

Final Project (Interactive Solutions)

Project Description:

Currently, the world is going through a crazy epidemic (COVID-19). I hope all is well and are being safe. There are numerous data available online about COVID-19, such as COVID new cases per state, fatalities per country. As a data scientist, you are in charge of building an interactive chart that depicts numerous angles (at least three).  

Activities:

1. Data Acquisition, Examination, and Transformation.

a. Collect the dataset you are planning to use within your project.

b. Data Examination 

i. Examine the dataset to determine how you want to create an interactivity design and briefly explain your Solution.

c. If needed, perform Data Transformation

i. Perform data transformation techniques such as data cleansing, conversion, creation, and consolidation on the dataset.

ii. Record the transformation activities you performed on your dataset.

2. Data Exploration

a. Decide how you want to present the data.  

b. Decide the tool you would like to create the interactive Solution. The tool could be a developer’s tool or non-developer’s tool.

c. If you are not familiar with the tool, complete a tutorial. The reference below includes links to different types of interactive tools and tutorials.

3. Interactive Solution

a. Design and develop an interactive solution.

b. Explain the challenge you encounter.

c. Explain how to avoid such occurrence when and if you decide to go live/production.

4. Proposed Dynamic Solution

a. Explain how you would modify your solutions that allow the data to change (dynamic) with a database continually. 

Deliverables:

Word file with writing about the following:

· Data Acquisition, Examination, and Transformation [10 points]

· Data Exploration [10 points]

· Interactive Solution [40 points]

· Proposed Dynamic Solution [10 points]

· Screenshots of the different angles of the interactive Solution [4 points]

· APA formatting required. [5 points]

· At least five pages including cover page and reference list [1 point]

Submit a draft copy by 23 November 2020 at 11:59 PM and the final version on or before 30 November 2020. Draft copy submission is available in the week 13 folder while the final submission will be open during week 14

· Draft submission should include at least the Data Acquisition, Examination, and Transformation section [5 points]

· All other sections [75 points]

Resources:

1. https://thenextweb.com/dd/2015/04/21/the-14-best-data-visualization-tools/

2. https://www.d3-graph-gallery.com/index.html

Please write 350 words essay on the following with references?

 Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

Paper

Chapter 1 Paper: Review the Key Lessons from Chapter 1 – Explain the five key lessons and note the importance of each key lesson from chapter 1.  Also, note why is it important to understand these basic concepts.  (Information Technology and Organizational Learning Textbook) 

The above submission should be one page in length and adhere to APA formatting standards.

Malicious Activities 4.0

Based on your research:

  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.
  • Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.
  • Provide a full citation and reference, formatted according to Strayer Writing Standards.

security

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.