Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?

Please a topic from the below list and create a one-page essay answering the question noted below. 

Please use at least one reference and ensure it’s in APA format  (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY  from any source (student or online source), rather rephrase the author’s  work and use in-text citations were necessary.

  • Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
  • List and briefly describe the nine-step process in conducting a neural network project.
  • What is the main difference between classification and clustering? Explain using concrete examples.
  • What are the privacy issues with data mining? Do you think they are substantiated? 

Exploratory Data Analysis

After the data is collected, we perform exploratory data analysis using simple visualization methods to gain a better understanding of the data that we will be working with during the analytical process.

In this critical thinking assignment, you will use the results from the preliminary data analysis that you completed in the previous week and use R and Tableau to investigate the variables of interest to the research questions.

R can be downloaded free from the closest mirror servers in Turkey: either https://cran.pau.edu.tr/ or https://cran.ncc.metu.edu.tr/.

Here is the list of all mirrors: https://cran.r-project.org/mirrors.html

Tableau for Students can be downloaded free here: https://www.tableau.com/academic/students.

Students will need to apply for a student license (and extend when it expires): https://www.tableau.com/academic/students#form

Scenario:

Continuing with the scenario you selected for your assignment last week—Titanic or Telecom Customer Churn—complete the following requirements. You will be utilizing some of your previous work in this assignment.

Requirements:

Part I: Contextualization

In the Introductory section of your report, provide a contextualization of the dataset by doing the following:

  1. Specify the selected dataset.
  2. Summarize the three research questions you have constructed.
  3. Summarize the findings from the preliminary data analysis.
  4. For each research question, identify the target (dependent) and predictor (independent) variables.

Part II: Statistical Description

  1. Write an R script that uses the summary() method to generate the statistical descriptions of the variables in the data subset. Capture the outcome from the R code.

Part III: Univariate Analysis

  1. Write an R script to count the different values of each relevant variable (column) in the dataset(s).
  2. Use the counts calculated for task prompt E to generate a histogram for each variable in Tableau.
  3. Summarize the findings from the inspection of the histograms that support the univariate distribution analyses.

Part IV: Bivariate Analysis

  1. Select appropriate visualization formats to depict the relationship between the target and the predictor variables.
  2. Summarize the observations from the visual inspections of the visualizations completed in task (a).

Part V: Outliers

  1. Describe the outliers in the dataset(s). Provide the calculations used to identify them using any tool and method of choice.

Part VI: Reporting

  1. Write a detailed APA-formatted report that summarizes the findings from the Exploratory Data Analysis for an audience of data analyst peers. Include details on the methodology and tools and support the findings with appropriate visualizations and screenshots of outputs from the use of the software tools.

Please respond to each of the task prompts organized by the Parts of the assignment. Your work for parts I-V should be total of 3-4 pages (approximately 1 page per part).

The report required for task prompt VI is a stand-alone document that will organize some of the elements of the responses to the other task prompts in a professional report that summarizes your actions, code, and findings and should not exceed 3 pages.

You will upload a zipped file that includes the responses to the task prompts your report, and all supporting files, including the R code and Tableau files.

Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings. Include a title and reference page.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

SE

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words

 Discussion 1: Examine Alexa’s skill in ordering drinks from Starbucks (i.e. What is the development of the skills?  (From what to what level of features). 

 Discussion 2: Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report. 

Comparison Outline

Software engineering tools for soft computing: MATLAB, R Tool and DTREG. Comparison should focus on how they are able to model neural networks. Also, pick criteria that compares things they all have in common. 

Discussion on data mining with a business problem

In this assignment, submit your topic and references, in APA format of preliminary references.

Discussion posts will include:

  1. Provide the title of the paper (note: you may change the wording in the official title in the final version however, you cannot change the topic once you select one).  the paper is on a business problem you are going to solve with analytics.
  2. Include an introduction on the topic
  3. A minimum of 3-5 references in proper APA format

Deep Web and phishing

 Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. Define and describe the “deep web” or Tor Net and the ‘dark web’.

2. What is phishing? How does phishing fit into the problem of identity theft?

Organ Leader & Decision Making

 

Week 10 Assignment

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth ten (20) points. You are required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date. If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment. There is a grading criterion associated with this assignment. Your work will be compared to other’s work, using SafeAssign for plagiarism, so please note that copying other people’s responses will not be tolerated.

Personal Reflection Assignment

Required Textbook: Stair, R. M., & Reynolds, G. W. (2018). Principles of information systems. Boston, MA: Cengage Learning. 

Course name: New Technologies for Business Leaders 

This course majorly on Blockchain Technology

Assignment:

Provide a reflection of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Access Control Systems

 Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals if such data were used in other ways. In your view, are such concerns justified? Why or why not? (2-Paragraphs)

                                                             And 

 

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 2-3 paragraphs.