Define the following database terms

  

1) Define the following database terms: relational database, table, record, and field. 

2) What is SQL and what is it used for? Can you give some examples of SQL statements and explain what results are obtained from these statements?

3) Read the Week 7 iLab instructions and discuss the expectations you have regarding this lab. Do you see the importance of being able to access a database from a script or program? How did your actual lab experiences meet your expectations? Are there specific insights or challenges you encountered that you would like to share with the class?

 

What did you learn about VBScript database access and SQL commands in completing this lab?

Unit Testing for Authentication and Logging

 Overview: 

This homework will assess your ability to design, code, and prepare unit tests for a simple login application. The application should be a standalone desktop application without any Web components. You can code the application in Java, C#, or C++. 

Assignment: Total 100 points:

Using the readings from weeks 1 and 2 as a baseline, develop a graphical user interface that allows a user to log in to a system. The login screen should contain fields for entering a username and password and buttons to submit the information for authentication and a button to clear or reset the fields. 

You can hard-code the password authentication for now- as the purpose of this exercise is Unit testing. The system should log all attempts into a Log.txt file. The log should include the username, the date, the time, and if the login was successful or not. 

Create multiple Unit tests (use Junit if selecting Java, and Visual Studio Unit Test if using C++ or C#). You should design and implement a comprehensive set of Unit tests – a minimum of 4 that includes testing of the login form with successful/unsuccessful logging attempts and the logging functionality to the Log.txt file. You should run your unit tests and clearly show the results for each test in your submission. 

Deliverables: You should submit your source files, example log files, and a word (or PDF) document providing a detailed explanation of each of the unit tests along with screen captures showing the results of your unit tests. Screen captures are clearly labeled indicating exactly what the screen capture represents.

Machine Learning pytorch

CMSC 510 HW2 –

The goal of the homework is to gain familiarity with PyTorch (to install it, see:
https://pytorch.org/get-started/locally/ ), a machine learning library for python that allows for
defining the machine learning model and performing gradient descent for it in an automated
way.

Complete 4 exercises described below, and submit via Canvas a zip file with four Jupyter
Notebook files, one per each exercise. Each notebook should contain the code, as well as short
reports on the results of experiments.

Exercise 1.

Train a linear classifier for the Iris dataset (a 3-class classification problem, file iris.csv in
Canvas), using Mean Squared Error as loss (see pytorch_linear_Iris_MSE.py file on Canvas).
Perform an analysis of the behavior of training risk and accuracy for different learning rates.  

Detailed steps:
a) Use pandas to load the iris dataset. Create dummy variables for the classes

b) Define pytorch tensors for the dataset using:  
torch.tensor

c) Define pytorch tensors (with gradient) for weights and biases (W & b). W should be
n_features x n_classes, b should be 1 x n_classes. Initialize b to zeros (torch.zeros), and W to
random values sampled from a normal distribution with null mean – try different values for the
standard deviation and observe changes in the training behavior.

d) Define pytorch optimizer over variables W & b
torch.optim.SGD or torch.optim.Adam

e) Create the main loop that goes over the dataset in multiple epochs. In each epoch
e1) clear gradients (using optimizer.zero_grad)
e2) calculate linear predictions: pred=X W + b using
torch.matmul
e3) pass the linear predictions through the unipolar sigmoid: sigmoid(pred)=1/(1+exp(-
pred)). Use these functions:
torch.log, torch.exp
e4) calculate the squared difference between the predictions (after sigmoid) and the
true classes, for all three output neurons. Use:
torch.pow
e5) calculate risk = average the squared difference over the training samples. Use:
torch.mean e6) calculate gradients of risk with respect to W & b (call risk.backwards)
e7) make optimizer step (using optimizer.step)
e8) calculate accuracy

Experiment with different learning rates for the two optimizers and report the behavior of the
training loss and accuracy.

Exercise 2.

Train a linear classifier for the Iris dataset, using CrossEntropy as loss. Perform an analysis of the
behavior of training risk and accuracy for different learning rates.  

Detailed steps – follow Exercise 1, but replace MSE with CrossEntropy:

e3) pass the linear predictions through softmax (i.e., normalize the unipolar sigmoids for classes
i=1,…,3 to sum up to 1 for each sample)

e4) calculate the cross entropy after softmax (sum_{i=1}^3 y_i ln(softmax_i)).  
torch.multiply, torch.log, torch.sum

e5) calculate risk = average the cross entropy over the training samples

Experiment and report results as in Exercise 1.

Exercise 3.

Starting from Exercise 2, add a split of the Iris dataset into a training set and a test set. Also, in
the training loop, go over small batches of samples (e.g. 20 samples) instead of always over the
whole training set. Experiment with batch size and learning rate.

Exercise 4:

Linear classifier for MNIST Digits dataset. Explore the behavior of the code from Exercise 3 on a
larger, more complicated dataset and report the results.  
The number of training samples is 50,000 – analyze training behavior if a random subset of 100,
500, 1000, 2000 samples is used instead. Also, experiment with the learning rate and the batch
size.

For loading the dataset, use: import torchvision.datasets as datasets
full_train_dataset = datasets.MNIST(root=’./data’, train=True, download=True, transform=None)
full_test_dataset = datasets.MNIST(root=’./data’, train=False, download=True, transform=None)
x_train = full_train_dataset.data.numpy().reshape(-1,n_features).astype(dtype=np.float)/255.0;
x_test = full_test_dataset.data.numpy().reshape(-1,n_features).astype(dtype=np.float)/255.0;
y_train_cat = full_train_dataset.targets.numpy()
y_test_cat = full_test_dataset.targets.numpy()
Note that the download of the dataset may take long time. As with Iris, convert categorical
variables for classes into dummy variables (there are 10 classes).  

 

Research Paper on Operational Excellence

how to improve company operations using SAAS legacy to  – cloud computing models(SAAS) – benefits of SAAS in cloud.

Title

how to research

design/methodology/

outcome

list of iteams

introductions

summary

references

federated architecture in cloud systems

 

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Cybersecurity Project Ideas/Proposals with 5 Milestones (Steps)

You must submit 3 cybersecurity project proposals with the topic being 50-100 words and five milestones being 25-50 words each. I can’t think of any good project ideas along with 5 steps explaining what and how I will be completing the project. Please try to think of easy ones. This project is NOT just written material but has to being something relating to cybersecurity by creating, developing, experimenting, or producing something. Please read the pdf attachment before bidding. Thank you.

Canvas Cloud Architecture Security Risks

 

Introduction

O’Keefe State University located in New Mexico has recently started using Canvas for online course delivery. Canvas hosts all the data in its own cloud storage. Students may log in to the systems form any personal device (laptops, phones, etc.). On-campus students can also use library computers. Note that the browsers may store student credentials (IDs and passwords) in a browser.

Directions 

Write a two-page security risk analysis to identify all possible security risks associated with the usage of Canvas in the library or on home computers.

Specifically address whether Canvas cloud architecture increases or decreases the cybersecurity risks associated with it, when compared to an old learning system that stored all student data on a servers located on-campus and managed by the university IT personnel. 

Security frameworks NIST 800-53r5 and ISO 27001-27002- No plagiarism – 18 slides

You have been asked to prepare a presentation describing the use of NIST 800-53r5, and ISO 27001-27002 in your security strategy. Frame your discussion by referencing the NIST model of cloud security from NIST 800-145.  Your presentation should:

  • Describe the standard.
  • Discuss how it can be useful to manage cloud security.
  • Highlight any commonalities, differences, or mappings between the standards.
  • State if and how they are supported by either AWS, Azure, or Google Cloud Platform.