Uses of Efficient Frontier Analysis in SRM

  

Chapter 22 presented a case study in creating value from uncertainty, and chapter 25 presented the use of efficient frontier analysis in SRM. Assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25. How would you explain the results of the analysis to non-technical decision makers? What recommendation would you make, assuming the risk appetite presented in chapter 25?

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25. How would you explain the results of the analysis to non-technical decision makers? What recommendation would you make, assuming the risk appetite presented in chapter 25?

PCI

In 80 words or more why is customer PCI (payment card information) data important to safeguard. What are the consequences for breach of a customer’s PCI?

programming

1.  A starter solution has been provided to you as zip file. When submitting your own unit test methods, zip the contents of the src directory into a single zipped file. Make sure the zipped file has a .zip extension (not .tar, .rar, .7z, etc.).

ObstaclesWarrior.zip

#2

Obstacle Warrior

Objectives: Create a Java program using programming fundamentals (file I/O, loops, conditional statements, arrays, functions)

Problem: In an effort to win a coding competition, you decided to create an awesome Obstacle Warrior game. The game is played on a 2-dimensional board similar to a Chess board, but the dimensions may be different. The minimum size of the board is 2×2. The board will have a Start square and an Exit square that are not stored on the board. Start and Exit squares cannot be the same. Other board squares may contain obstacles in the form of an integer that will define how the warrior position and score will be affected. The obstacle squares can have values from 0 to -10 only. The Start square is always a clear square. All clear squares are marked with # on the board. The Exit square may contain an obstacle that is not a zero. The size of the board, number of obstacles, and Start and Exit squares are all unknow to your code prior to running. This information is stored in a file that your code will read at the beginning of the game. The board.dat file must be read into a 2-D array.

A warrior must start at the Start square and find their way to the Exit square. The warrior can move on the board in any direction including diagonally, one square at a time. A warrior has a running score (integer) maintained from the start of the game until the warrior exits the board. If the warrior lands on an obstacle square with a value of zero, the warrior is sent back to the starting position and the obstacle square will become a normal square (obstacle removed). If the obstacle square has a negative number, that number will reduce the warrior’s score by the value of the obstacle, and the obstacle square will become a clear square (obstacle removed). Each VALID move that the warrior makes without landing on an obstacle will earn the warrior one point. The moves for the warrior are randomly generated by your code in the form of a direction (0-UP, 1-DOWN, 2-LEFT, 3-RIGHT, 4-UPRIGHT, 5-DOWNRIGHT, 6-UPLEFT, 7-DOWNLEFT). If the warrior is at the boundary of the board and your code generates an invalid move, that move will be ignored. Your code will keep generating moves until the warrior exits at the Exit square. Once the warrior exits, your program will store the updated board information to a new file ResultBoard.dat as single-space separated data. The program will also display the total number of valid moves, the total time elapsed in milliseconds since the first move until the warrior exited the board, the final score of the warrior and the formatted board information (right aligned columns with total of 5 spaces).

Output Format:

  • Each column in the final board display must be of total width of 5 spaces
  • Data in each column must be right aligned

Enter the board data file path: C:board.dat //Repeat prompt until valid file OR show error and exit.

Type “Start” to start the game or “Exit” to exit the game: exit //Your program must exit

Enter the board file path: C:board.dat

Type “Start” to start the game or “Exit” to exit the game: start //You may display the moves and the running score after each move but it is not required

The warrior made 270 valid moves in 503 milliseconds. The final score is 175 points.

 #  #  #  #  #

 #  #  #  0  #

 #  #  #  #  #

 #  -3  #  #  -4

 #  #  #  #  #

Press any key to exit!

Program Structure: Your code should be modular and easy to understand. In addition to the main method, the following methods are required to be in your code. These methods will be used by the unit testing to test the accuracy of your code.

public static String[][] ReadBoardFromFile(String fileName, Position startPosition, Position exitPosition)

public static boolean WriteBoardToFile(String fileName, String[][] boardArray)

public static int GenerateDirection()

public static boolean MoveWarrior(int direction, String[][] boardArray, Position currentPosition)

public static int CalculateWarriorScore(int currentScore, Position currentPosition, String[][] boardArray)

public static String DisplayResults(int currentScore, int numberOfMoves, int timeElapsed, String[][] boardArray)

Program Flow:

  • Program starts in main() method
  • Prompt user for Board.dat file path
  • Read board from file
  • Generate a direction
  • Move the warrior
  • Calculate new score
  • Check conditions and clear square if needed
  • Repeat until the warrior is at the exit square
  • Display the results
  • Prompt user to exit game

Board.dat file format:

  • The data in the file will be separated by one space
  • Assume that all data in the file is valid
  • Clear and Start squares (no obstacles) will be marked with # in the file
  • The first line of the file contains the dimensions of the board (rows and columns) e.g. 3 7
  • The second line contains the Start square indexes (rowIndex, columnIndex)
  • The third line contains the Exit square indexes (rowIndex, columnIndex)
  • The rest of the lines represent the contents, including obstacles, of a row on the board
  • Example of a Board size 5×5 data file:

5 5

2 2

4 3

# -5 # # #

# # # 0 #

# # # # #

# -3 # # -4

-10 # # # #

**ResultBoard.dat file format: **

  • Data must be separated by a single space

# # # # #

# # # 0 #

# # # # #

# -3 # # -4

# # # # #

Grading:

  • Coding standards, style and comments (10 Points)
  • Unit testing methods x6, one for each of the methods mentioned above (10 Points)
  • ReadBoardFromFile (10 Points)
  • WriteBoardToFile (10 Points)
  • GenerateDirection (10 Points)
  • MoveWarrior (20 Points)
  • CalculateWarriorScore (20 Points)
  • DisplayResults (10 Points)

Notes:

  • The “Position” class has been provided to you. You may add new methods/constructors to this class, but don’t change existing methods
  • Part 1 deliverables: Unit Test methods only – Submit on eLearning
  • Part 2 deliverables: Functioning program – Submit on zyBooks (You may resubmit your Unit Test method on eLearning)

Research Paper: Business Process Redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Identity and Access Management

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.   Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats. 

Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

Week 4 – Assignment 4

  

1. Explain the relationship among data mining, text mining,

and sentiment analysis.

2. In your own words, define text mining, and discuss its

most popular applications.

3. What does it mean to induce structure into text-based

data? Discuss the alternative ways of inducing structure

into them.

4. What is the role of NLP in text mining? Discuss the capabilities

and limitations of NLP in the context of text mining.

Go to teradatauniversitynetwork.com and find the case

study named “eBay Analytics.” Read the case carefully and

extend your understanding of it by searching the Internet

for additional information, and answer the case questions.

Go to kdnuggets.com. Explore the sections on applications

as well as software. Find names of at least three

additional packages for data mining and text mining.

What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

Enterprise Risk management

 

Chapter 3 presented the approach Mars, Incorporated used to implement ERM, and chapter 5 presented the University of California Health System’s ERM development. In what ways are the two organization’s approaches to ERM similar? How do they differ? Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.  

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, describe in what ways the two organization’s approaches to ERM are similar. Also, explain how they differ. Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.

B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads, evaluating the pros and cons of that student’s recommendations. Your comments should extend the conversation started with the thread.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

NOTE: These discussions should be informal discussions, NOT research papers. If you MUST directly quote a resource, then cite it properly. However, I would much rather simply read your words.