Research Paper

Step 3: complete a report based on your understanding of the Quality Data Model (QDM).

Download and read a document on Quality Data Model (QDM). Focus your reading on sections 1.1-1.5, and 2.1 – 2.8.

Tasks: Write a report that contains your answer to the following questions:

1. Why a quality data model is needed? Explain QDM’s importance in healthcare information system using examples you have seen or discussed in this Module’s required readings. (10 points)

2. Figure 1 in section 2.5 shows an example QDM element structure on the left. The diagram to the right is an example of QDM element called “Laboratory Test”. Suppose you are member of an interprofessional team working a quality health database project for a hospital. Explain how you would design a database table to store data containing in the ODM element “Laboratory Test”. For example, what is the name of this table? What are the columns to include in this table? (10 points)

3. Suppose the same database contains other tables describing ODM elements such as Doctor, Patient, Medication, Pharmacy, Pharmaceutical Company, etc. Describe ONE scenario where you can use this database to address questions related to QDM element “Laboratory Test”.  (40 points)

Introduction to Data Mining

  For this project, you will write a 3-5 page APA formatted paper on a business problem that requires data mining. You will select an organization that has a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how you plan to get the data. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, insufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures. 

The paper should include the following sections each called out with Headers. 

· Introduction: Overview of the Term Paper.

· Background: The section should be a Company Overview that includes the company name, the industry they are in, and a general overview of the organization.

· Challenges: Discuss the challenges that the organization has with a particular business problem around data mining. 

· Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?

· Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. 

· References: Please include a separate reference page with at least 3 references.

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.

Your paper should include an abstract and a conclusion and a reference page with 3-5 references.

Discussion

There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from either the UC library or Google Scholar. 

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 

Reflective writting Topic related to “Decision Mkg/Essent Bus Comm “

question 2. Final Reflective writting (approximately 500 words).

What are some assumptions and expectations you have about this Decision Mkg/Essent Bus Comm 

How will you engage in the process for Content Discussions and Weekly Logs?

What questions do you have about the Communication Audit Project?  

What is your understanding of the Virtuous Business Model, and how do you plan on applying it to your learning?

What has been your previous experience doing research?

follow check below link to know how to write reflective writting

http://www2.port.ac.uk/media/contacts-and-departments/student-support-services/ask/downloads/Reflective-writing

Final Term Paper

Don’t make assumptions “READ the instructions”

This is only an announcement to give you a head start and ample time to submit a great term paper…….all Marginal & Mediocre papers will get a bad grade !!!!   ( Do not wait until the last minute to do your work) 

Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures. 

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. We will check for Plagiarism. 

Attention your originality report should be at least  5% or lower to received a high score.

All severe incidents of plagiarism will result on bad grade (0) and reported to student affairs for further disciplinary actions. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. 

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

  • 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)
  • TOPIC :::::  Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures.
  • Cited sources must directly support your paper (i.e. not incidental references)
  • At least 500 words in length (but NOT longer than 1000 words)

Admin Notes:

APA Paper Formatting guidelines

1.Title page

2.Abstract

3.Body

4.Text citation and references

Additionally

-As usual, the text is typed on standard white paper that has familiar parameters of 8.5″ x 11″.

-The APA style requires using an easy to read font and recommends using a 12pt Times New Roman font.

-Double spacing is required on both the title page and throughout the paper.

-Margins should be 1″ concerning all sides of the page.

-Paragraph indentation should be set to one half inch from the left side of the page.

-The unique aspect is in creating a special page header that consists of the page number and the running head as typed on the title page in all capitals.

For more information on APA format consult APA, 6th Edition American Psychological Association, also  The OWL at Purdue is a good resource (see related link) on APA format.

https://owl.english.purdue.edu/owl/resource/560/01/

Help with peer reviewed papers or articles

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles

http://libguides.gwu.edu/education/peer-reviewed-articles

Advanced Operating Systems Project

There are 4 part for the project and the question may be long to read but it’s not a heavy work because there are many examples and explanations for the each parts.

*Part 1.  The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk

{

public :

Sdisk(string diskname, int numberofblocks, int blocksize);

int getblock(int blocknumber, string& buffer);

int putblock(int blocknumber, string buffer);

int getnumberofblocks(); // accessor function

int getblocksize(); // accessor function

private :

string diskname;        // file name of software-disk

int numberofblocks;     // number of blocks on disk

int blocksize;          // block size in bytes

};

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
                        

                                                            -figure 0 (what I attached below)              

  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.

*Part 2.  The second part of this project requires that you implement a simple file system. In particular, you are going to write the software which which will handle dynamic file management. This part of the project will require you to implement the class Filesys along with member functions. In the description below, FAT refers to the File Allocation Table and ROOT refers to the Root Directory. The interface for the class should include :

Class Filesys: public Sdisk

{

Public :

Filesys(string diskname, int numberofblocks, int blocksize);

int fsclose();

int fssynch();

int newfile(string file);

int rmfile(string file);

int getfirstblock(string file);

int addblock(string file, string block);

int delblock(string file, int blocknumber);

int readblock(string file, int blocknumber, string& buffer);

int writeblock(string file, int blocknumber, string buffer);

int nextblock(string file, int blocknumber);

Private :

int rootsize;           // maximum number of entries in ROOT

int fatsize;            // number of blocks occupied by FAT

vector filename;   // filenames in ROOT

vector firstblock; // firstblocks in ROOT

vector fat;             // FAT

};

An explanation of the member functions follows :

  • Filesys()
    This constructor reads from the sdisk and either opens the existing file system on the disk or creates one for an empty disk. Recall the sdisk is a file of characters which we will manipulate as a raw hard disk drive. This file is logically divided up into number_of_blocks many blocks where each block has block_size many characters. Information is first read from block 1 to determine if an existing file system is on the disk. If a filesystem exists, it is opened and made available. Otherwise, the file system is created.The module creates a file system on the sdisk by creating an intial FAT and ROOT. A file system on the disk will have the following segments:
                                                      
                                                             -figure 1 (what I attached below)           

  • consists of two primary data objects. The directory is a file that consists of information about files and sub-directories. The root directory contains a list of file (and directory) names along with a block number of the first block in the file (or directory). (Of course, other information about the file such as creation date, ownership, permissions, etc. may also be maintained.) ROOT (root directory) for the above example may look something like

                                                    -figure 2 (what I attached below)

    The FAT is an array of block numbers indexed one entry for every block. Every file in the file system is made up of blocks, and the component blocks are maintained as linked lists within the FAT. FAT[0], the entry for the first block of the FAT, is used as a pointer to the first free (unused) block in the file system. Consider the following FAT for a file system with 16 blocks.

                                                        -figure 3 (what I attached below)

  • In the example above, the FAT has 3 files. The free list of blocks begins at entry 0 and consists of blocks 6, 8, 13, 14, 15. Block 0 on the disk contains the root directory and is used in the FAT for the free list. Block 1 and Block 2 on the disk contains the FAT. File 1 contains blocks 3, 4 and 5; File 2 contains blocks 7 and 9; File 3 contains blocks 10, 11, and 12. Note that a “0” denotes the end-of-file or “last block”.
    PROBLEM : What should the value of FAT_size be in terms of blocks if a file system is to be created on the disk? Assume that we use a decimal numbering system where every digit requires one byte of information and is in the set [0..9].
    Both FAT and ROOT are stored in memory AND on the disk. Any changes made to either structure in memory must also be immediately written to the disk.
  • fssynch
    This module writes FAT and ROOT to the sdisk. It should be used every time FAT and ROOT are modified.
  • fsclose
    This module writes FAT and ROOT to the sdisk (closing the sdisk).
  • newfile(file)
    This function adds an entry for the string file in ROOT with an initial first block of 0 (empty). It returns error codes of 1 if successful and 0 otherwise (no room or file already exists).
  • rmfile(file)
    This function removes the entry file from ROOT if the file is empty (first block is 0). It returns error codes of 1 if successful and 0 otherwise (not empty or file does not exist).
  • getfirstblock(file)
    This function returns the block number of the first block in file. It returns the error code of 0 if the file does not exist.
  • addblock(file,buffer)
    This function adds a block of data stored in the string buffer to the end of file F and returns the block number. It returns error code 0 if the file does not exist, and returns -1 if there are no available blocks (file system is full!).
  • delblock(file,blocknumber)
    The function removes block numbered blocknumber from file and returns an error code of 1 if successful and 0 otherwise.
  • readblock(file,blocknumber,buffer)
    gets block numbered blocknumber from file and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • writeblock(file,blocknumber,buffer)
    writes the buffer to the block numbered blocknumber in file. It returns an appropriate error code.
  • nextblock(file,blocknumber)
    returns the number of the block that follows blocknumber in file. It will return 0 if blocknumber is the last block and -1 if some other error has occurred (such as file is not in the root directory, or blocknumber is not a block in file.)IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the sdisk.

*Part 3.   The third part of this project requires that you implement a simple shell that uses your file system. This part of the project will require you to implement the class Shell along with member functions. The interface for the class should include :

class Shell: public Filesys

{

Public :

Shell(string filename, int blocksize, int numberofblocks);

int dir();// lists all files

int add(string file);// add a new file using input from the keyboard

int del(string file);// deletes the file

int type(string file);//lists the contents of file

int copy(string file1, string file2);//copies file1 to file2

};

An explanation of the member functions follows :

  • Shell(string filename, int blocksize, int numberofblocks): This will create a shell object using the Filesys on the file filename.
  • int dir(): This will list all the files in the root directory.
  • int add(string file): add a new file using input from the keyboard
  • int del(string file): deletes the file
  • int type(string file): lists the contents of file
  • int copy(string file1, string file2): copies file1 to file2

IMPLEMENTATION GUIDELINES :

See the figure 4  (what I attached below) for the ls function of Filesys.

See the figure 5 (what I attached below) for dir function of Shell. 

See the figure 6 (what I attached below)  for main program of Shell.

*Part 4.  In this part of the project, you are going to create a database system with a single table which uses the file system from Project II. The input file will consist of records associated with Art History. The data file you will use as input consists of records with the following format: The data (180 records) is in date.txt file (what I attached below)

  • Date : 5 bytes
  • End : 5 bytes
  • Type : 8 bytes
  • Place : 15 bytes
  • Reference : 7 bytes
  • Description : variable

In the data file, an asterisk is also used to delimit each field and the last character of each record is an asterisk. The width of any record is never greater than 120 bytes. Therefore you can block the data accordingly. This part of the project will require you to implement the following class:

Class Table : Public Filesys

{

Public :

Table(string diskname,int blocksize,int numberofblocks, string flatfile, string indexfile);

int Build_Table(string input_file);

int Search(string value);

Private :

string flatfile;

string indexfile;

int IndexSearch(string value);

};

The member functions are specified as follows :

  • Table(diskname,blocksize,numberofblocks,flatfile,indexfile)
    This constructor creates the table object. It creates the new (empty) files flatfile and indexfile in the file system on the Sdisk using diskname.
  • Build_Table(input_file)
    This module will read records from the input file (the raw data file described above), add the records to the flatfile and create index records consisting of the date and block number, and then add the index records to the index file. (Note that index records will have 10 bytes .. 5 bytes for the date and 5 bytes for the block number.)
  • Search(value)
    This module accepts a key value, and searches the index file with a call to IndexSearch for the record where the date matches the specified value. IndexSearch returns the blocknumber of the block in the flat file where the target record is located. This block should then be read and the record displayed.
  • IndexSearch(value)
    This module accepts a key value, and searches the index file indexfile for the record where the date matches the specified value. IndexSearch then returns the block number key of the index record where the match occurs.

See the figure 7 (what I attached below) for the main program of Shell which includes a search command.

Security Architecture and Design

 One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?” 

History of Cryptography

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page

Discussion-4 MM

 Select a problem that a firm might have bringing out a new product or service and discuss how the firm could overcome that problem.  

1. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. 

2. REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.