need help
Machine learning
Exp#1: Develop a system based on two-class Support Vector Machine (SVM) that can predict if the subject will purchase iPhone. Dataset:
https://github.com/omairaasim/machine_learning/blob/master/project_11_k_nearest_neighbor/ip hone_purchase_records.csv
Training/ Test Split: 75-25
Exp#2: Develop a voting classifier based on Decision Tree, Logistic Regression and SVM.
Business Plan
Finalize your business plan for the new HWE Accessories website by incorporating your instructor’s feedback into a well-integrated, cohesive document, including all previous sections submitted in Wks 1–5.
Additionally, create a 3- to 5-page post-implementation review plan. The plan must include the following:
- How you will determine if project results are consistent with the business case
- How to identify if project goals are attained
- How to address stakeholder satisfaction
- How to analyze project costs and benefits
- How to identify future development needs
- How you will document lessons learned
Format any citations according to APA guidelines.
Week 9
Explain the three different types of factors for multi-factor authentication.
Remember to cite at least one scholarly peer-reviewed article.
All citations should be in APA format.
Blockchain – Business network membership policy 1500 words
Create a membership policy that describes the benefits and requirements of membership in your Letter of Credit business network. Your policy should be no less than 1000 words and no more than 1500 words.
Email forensics
Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search? Need a word document with no less than 250 words.
Question based on a book from Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications
Kirk (2016) tells us that all requirements and restrictions of a project must be identified. Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:
- People: stakeholders, audience.
- Constraints: pressures, rules.
- Consumption: frequency, setting.
- Deliverables: quantity, format.
- Resources: skills, technology
Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications
Technology
due is October 4th.
cys-self
Explain (in 3-4 paragraphs) how you feel about the need for Internet privacy. If you value your own privacy, explain why you do. If you feel you have nothing to hide, explain why you believe your privacy is protected.
Discussion
For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.
Suggestions:
- Begin with an description of the organization and the computer system you have chosen.
- Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.
- Draw from the assigned readings (and independent research) to identify what topics should be included.
- If you feel that slide information is not self-explanatory, add additional details in the presentation notes.