del

Please do not write any codes, use clearly English and pseduo-code only. Thank you  

111

Week 3 Assignment 3 Business Intelligence

 Chapter 5

1. What is an artificial neural network and for what types

of problems can it be used?

2. Compare artificial and biological neural networks. What

aspects of biological networks are not mimicked by artificial

ones? What aspects are similar?

3. What are the most common ANN architectures? For

what types of problems can they be used?

4. ANN can be used for both supervised and unsupervised

learning. Explain how they learn in a supervised mode

and in an unsupervised mode.

Go to Google Scholar (scholar.google.com). Conduct

a search to find two papers written in the last five years

that compare and contrast multiple machine-learning

methods for a given problem domain. Observe commonalities

and differences among their findings and

prepare a report to summarize your understanding.

Go to neuroshell.com. Look at Gee Whiz examples.

Comment on the feasibility of achieving the results

claimed by the developers of this neural network model.

Chapter 6

What is deep learning? What can deep learning do that

traditional machine-learning methods cannot?

2. List and briefly explain different learning paradigms/

methods in AI.

3. What is representation learning, and how does it relate

to machine learning and deep learning?

4. List and briefly describe the most commonly used ANN

activation functions.

5. What is MLP, and how does it work? Explain the function

of summation and activation weights in MLP-type ANN.

Cognitive computing has become a popular term to define

and characterize the extent of the ability of machines/

computers to show “intelligent” behavior. Thanks to IBM

Chapter 6 • Deep Learning and Cognitive Computing 385

Watson and its success on Jeopardy!, cognitive computing

and cognitive analytics are now part of many realworld

intelligent systems. In this exercise, identify at least

three application cases where cognitive computing was

used to solve complex real-world problems. Summarize

The Future of Offices

 

Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?

Discussion forum on chapter readings

Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.

Chapter-3: Reinventing Financial Services

Discussion:

In chapter 3, the author describes eight core functions of the global financial service sector which blockchain technology will likely change. Choose one of the core functions described in chapter 3, and explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today.

Then think of three questions you’d like to ask other students. The questions should be taken from material you read in Chapter 1, 2, or 3. You’re not trying to test each other, but you are trying to start a discussion.

Write two pages document.

warehoousing

 Data Warehouse Architecture” (2 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing 

Reserach

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. 

Emerging Threats

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Security Architecture and Design

 

Consider diagram 7-1 from your textbook. Answer the following questions:

  1. Do presentation layers add an attack surface to the enterprise? How about an e-commerce presence?
  2. The supply chain will interact with an entire business ecosystem of many other organizations. Interactions will probably include both people and automated flows. Are these third parties to be trusted at the same level as the internal systems, such as content management or data analysis?