for PHD Doctorate

 Q3. In this exercise you’ll use R package tidyverse (see chapter 4 of Introduction to Data Science Data Analysis and Prediction Algorithms with R by Rafael A. Irizarry. You need to go through chapter 4 before attempting the following questions. Using dplyr functions (i.e., filter, mutate ,select, summarise, group_by etc. ) and “murder” dataset (available in dslab R package) and write appropriate R syntax to answer the followings: a. Calculate regional total murder excluding OH, AL, and AZ (Hint: filter(! abb %in% x) # here x is the exclusion vector) b. Display the regional population and regional murder numbers. c. How many states are there in each region? (Hint: n ()) d. What is Ohio’s murder rank in the Northern Central Region (Hint: use rank(), row_number()) e. How many states have murder number greater than its regional average (Hint: nrow() ) f. Display 2 least populated states in each region (Hint: slice_min() ) Use pipe %>% operator for all the queries. Show all the output results 

1. Define blockchain. 2. Discuss how enterprise blockchain enriches the definition of blockchain. You are required to cite this week’s assigned readings in your paper. You may also cite external sources if you wish.

 

Discuss the following: 1. Define blockchain. 2. Discuss how enterprise blockchain enriches the definition of blockchain. You are required to cite this week’s assigned readings in your paper. You may also cite external sources if you wish. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I often provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 words and it should be submitted no later than Wednesday before 11:59 pm EST.  Your response should be formatted in APA style and reference each of this week’s readings.

The following guidelines are used to grade your discussion papers:

1. Discussion posts are worth 24 points each week. Twenty points for the student’s initial discussion post paper, and 2 points each for peer response posts.  Your two peer replies should contain a minimum of 150 words each and should be submitted no later than Sunday before 11:59 pm EST. 

2. The following point allocations are used to grade all discussion papers: 5 points APA style, 5 points use of required readings, 5 points content, 5 points scholarly writing/grammar/structure. Failure to cite each week’s required readings will result in an automatic 5-point deduction. Failure to provide in-text citations of paraphrased and quoted material will result in an automatic 5-point deduction.

Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):

Writing Requirements for all Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Paper on IOT Threats to Database Security.

 The next big thing in the present tech savvy world is IOT, Internet of Things, in general sense Internet of things is nothing but the ability of devices to think and communicate with other smart devices over the Internet without any Human Interaction  . Every coin has two sides likewise there are advantage and disadvantages with the use of IOT.  

Paper should be in APA format, should be around 5 papers excluding intro, references, should be in APA format.

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 

Write in essay format not in bulleted, numbered or other list format

Data Visualization Week 3

 Please identify a computer system you have recently had experience with (at home, work,etc.); prepare an attached PowerPoint presentation (minimum 8 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to investigate the potential security issues. 

 

Suggestions:

  • Begin with a description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics – please note these as such in your presentation notes.
  • Draw from the assigned readings (and your independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

Business intelligence Week 1

 

Create a discussion thread (with your name) and answer the following question:

Discussion 2 (Chapter 2): Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

advantages and disadvantages of having interactivity in data visualizations?

Q 1: What are the advantages and disadvantages of having interactivity in data visualizations?  Provide at least three advantages and three disadvantages.  Why do you consider each an advantage and disadvantage? – 1-2pages.

Q2: For this discussion, please use your weekly readings to compose a response to the following prompt/question(s):

 

Graph 2 (You must select a different graph than one that you have previously discussed)

 

Select a data presentation from chapter 6 of the text (Grey Section).

 

Answer the following:

 

What is the visual that you selected?

What is the purpose of the visual?

What kind of data should be compiled in the selected visual?

What kinds of data should not be compiled in the selected visual?

How can you avoid making the visual misleading? – 1-2 pages.

Research project on OAuth

Research about “OAuth” and provide the following. It must consist of:

1. 5 sources annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

threat modeling and simulations

  

In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.

· Minimum 700 words

  Paper should be developed in accordance to APA

· Use citations with appropriate references

This assignment should be in APA format and have to include at least two references.