Business Intelligence

Why is the IoT considered a disruptive technology?

Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities

1-3 Final Project Review and Topic Submission

 The final project for this course is the creation of an information technology incident report. The rubric (Topic) attached covers the topic, while the “Final Rubric” covers the actual final project broken down in modules. The project is broken down into 3 modules.  The person chosen will come up with a topic for this specific question and I will work with them throughout the remaining modules.  Willing to pay $10 just to come up with a topic that will be used for the remaining modules and final.

Create summary tables that address relevant factors related to COVID-19(Must need knowledge on visualizing tools like Tableau or R datasets)

Academic Research Team Project Paper

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next you will create a dashboard that will allow you to explore the data in depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

PRACTICAL COONECTION ASSIGNMENT ON DATA MINING

For this project, you will write a 2-3 page APA formatted paper on a how your job/occupation or school major connects to Data Mining. You will select a particular industry you may be associated with and describe how you personally connect with that industry and Data Mining. You should provide discussion, references, and so on, in sufficient details. 

The paper should include the following sections each called out with a Headers. 

· Introduction: Overview of the Discussion.

· Background: The section should include history and background of organization’s name, and the industry associated with the organization.

· References: Please include a separate reference page any necessary references.

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least two scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

2 and half page

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse
1. user can signup and login and chat with each other (one to one chat for example facebook)
2. web page design is not needed.
4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.
3. it should be work in windows 10.

research paper

 

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

 

Chapter 2 Journal articles

Job search

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

D6

The attached document contains the question. 

250-300 words in length with a minimum of 2 references in APA format

Threat agent

  

a. Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.[600 words] 

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

b. Make sure to explain and back up your responses with facts and examples. Your responses should be in APA format and have to include at least two references.[600 words] 

  1. What does an assessor need to understand before she or he can perform an assessment?
  2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?