bi6 assignment

1. What is deep learning? What can deep learning do that

traditional machine-learning methods cannot?

2. List and briefly explain different learning paradigms/

methods in AI.

3. What is representation learning, and how does it relate

to machine learning and deep learning?

4. List and briefly describe the most commonly used ANN

activation functions.

5. What is MLP, and how does it work? Explain the function

of summation and activation weights in MLP-type ANN.
6.Cognitive computing has become a popular term to define

and characterize the extent of the ability of machines/

computers to show “intelligent” behavior. Thanks to IBM

Watson and its success on Jeopardy!, cognitive computing

and cognitive analytics are now part of many realworld

intelligent systems. In this exercise, identify at least

three application cases where cognitive computing was

used to solve complex real-world problems. Summarize

your findings in a professionally organized report.

NOTE :  be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)  
paper should be 1-2 pages lenth.

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.

 Include at least one quote from each of 3 different articles.  

 Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Topic : CAMERA

Discussion:

1. History and Sources of Data

2. Generic Business Case 

3. China Specific Use Case 

4. Pros and Cons 

5. Conclusion and Future 

Only number 5th Conclusion and Future needed to be done.

Database Security – New England College

Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Analysis of algorithm

 1. There are n marble balls, one of which is made of a different material. You have access to a Comparator that can compare two inputs (of an arbitrary number of marble balls) and determine if the two inputs are the same or not. The problem is to find the single marble ball that is different from the others while minimizing the number of times you access the Comparator. Design an efficient algorithm based on prune-and-search to solve the problem. Derive the time complexity of your algorithm. 

2.  Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q ={1, 5, 9, 15, 18, 22}, then MIN-GAP.Q/ returns 18 – 15 = 3, since 15 and 18 are the two closest numbers in Q. Make the operations INSERT, DELETE, SEARCH, and MIN-GAP as efficient as possible, and analyze their running times. 

Discussion 2- CET

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS. 

Discussion post should be about 300 words with 2-3 APA citations and matching references.  

BigData paper 4

This week we discussed Bitcoin Economics.  For this week’s research paper, you need to search the Internet and explain why some businesses are accepting and other businesses are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology.

Resource: PAVLUS, J. (2018). The World Bitcoin Created. Scientific American, 318(1), 32–37. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=126727561&site=eds-live

Paper requirements:

• Be approximately 4 pages in length, not including the required cover page and reference page.

• Follow APA 6E  guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least 5 peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  

• Be clear with well-written, concise, using excellent grammar and style techniques. 

Policy and legal_Week14

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?