Data Mining Paper and Presentation

This written assignment will demonstrate the student’s ability to apply the theory of datamining to the manufacturing industries.

The fields of data science and mining are applicable to nearly all industries. This is especially the case with the manufacturing field. In this area, the different areas of the manufacturing process provide ample areas to collect the data. Within each step of the manufacturing process, there are also more opportunities to collect data. This provides a mountain of the data to review, clean, and analyze.

Assignments

Please pick a manufacturing industry (e.g. auto, steel, or book making) and apply data mining to an individual step in the process. Please also address decision tree classifiers as part of the research paper.

Requirements

There are two portions for this part of the residency. You will create a research paper and presentation.

Provide a 1,000 word or 4 pages double spaced research paper.

Use proper APA formatting. Do not plagiarize. Cite other people’s work; they have put much effort into getting their work published and deserve to be recognized.

Demonstrate your understanding of how this would be applied to your choice of industry and step, along with the presentation.

Also, prepare a presentation based on your research paper.

With the number of students in the class, not everyone will have the opportunity to give their presentation. There will be a random selection from the class roster. Your presentation will be a maximum of 5 minutes.

Please turn in your research paper and presentation for each separate assignment. Do not turn in both for either (i.e. upload your research paper in the Research Paper assignment, and presentation at the Presentation assignment).

Please let me know if you have any questions.

Thank you.

White paper Project Assignment on ICO

 Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.   

 For this assignment, you’ll create a lightweight white paper for a fictitious Initial Coin Offering (ICO). You will use your imagination to create a brand new, hopefully unique, ICO, and develop a lightweight white paper that presents your ICO to prospective investors. A full white paper takes considerable time and effort to create. For this assignment, you’ll only be asked to provide the most essential elements. 

The goal is for you to be creative in your application of blockchain technology, and the explain your ideas.

 Assignment: 

Then, explore new and existing blockchain projects in “Healthcare” domain that interests you. You can start with an Internet search for “blockchain use cases” and “current blockchain projects.” Identify a few that you find interesting and learn about each one. Then, think of a new idea how you could apply blockchain in a new and useful way. 

Once you have your idea, create your white paper. Your paper should be in 6 pages APA format, and have the following sections:

1) Title – a headline that will catch your reader’s imagination

2) Abstract – Summary of what your whitepaper contains

3) Introduction – Introduce readers to the problem you will solve, the motivation to solve it, and how you’ll present your solution.

4) Problem/Market consideration – Explain the current situation (expand the problem from the introduction).

5) Literature Review

6) Solution – Describe your solution.

7) Summary – Close the sale.

8) References(Minimum 8 References ) 

Business Intelligence – 5

1. What is an artificial neural network and for what types of problems can it be used?

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?

3. What are the most common ANN architectures? For what types of problems can they be used?

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

5. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.

6. Go to neuroshell.com. Look at Gee Whiz examples.Comment on the feasibility of achieving the results claimed by the developers of this neural network model.  (go to  neuroshell.com click on the examples and look at the current examples listed, the Gee Whiz example is no longer on the page) 

Assessment 3: Digital Forensic Report

 

Hello,

i have an Assessment 3: Digital Forensic Report [Word count: 4000 words]

please check the attached file for complete details.

if you are able to do this please place your bid.

I need A+ grade in this so do quality work.. and I need plagiarism free work.

i also have attached 2017 as an example

Thank you.

Dissertation Topic PhD

 

Choose A topic  Identify a topic. What is the problem you want to address (must come from the literature and be cited). Who are saying there are problems? What has been done so far about the problem? Locate peer-reviewed articles related to your topic. What was the research questions in the studies? What findings were reported? Identify a gap in literature to justify your research. What is the purpose of your proposed study (be specific and clear)? What is the population you would like to address? What methodology are you planning on using? i.e. quantitative or qualitative? 

 Compare common methods to find which is most successsful in reducing the prevalence of social engineering.  Why: “The development and implementation of robust counter…….. Kaabouch, 2019). What:  What is the question you are looking to answer? Which is most successful? 

 Which measures are you wanting to compare?

How: Address how you will answer this? By doing what? Gathering what data 

Develop a Computer/Internet Security Policy

 

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

mysql and database (MySql WorkBench)

Show the results (using screenshots) of executing each SQL statement against the database you created for assignment #1. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output).

also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.

Research Outline

Instructions  

References Page and Sentence Outline

Reference Page:

1. Submit your references (minimum of 7) in a Word document.

2. Note that most websites, blogs, and sites like Wikipedia are not considered valid scholarly peer reviewed references. We are looking for journal articles. In your paper, be sure to cite everything you get from another source (i.e. direct quotations, charts, pictures, or summaries of someone else’s ideas). Also, be sure to include all of the materials that you have consulted in writing your paper, even if you did not cite them in the body of your paper. The Bible and course textbook can count as additional references. In addition to the latter references, you need to meet the outlined minimum for scholarly references. When in doubt, go above and beyond as minimums will not necessarily equate to quality and high evaluation marks.

3. Use current APA format in the construction of your entire paper including margins, spacing, and your references page.

Sentence Outline:

1. In the same Word document, but on separate pages, include an outline of your research paper. Include as much detail as possible without writing complete paragraphs. (This will help you as you construct your final version.)

2. A cover sheet is required (current APA format). The outline format will be as follows:

1. item 1

1.1. sub-item

1.1.1. sub-item

2. item 2

3. etc.

Topic and References are in document attached!

Order # 12527

Title: Network Installation

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, imagine your cousin, Frank, just bought a small hardware store. He wants to install a network that will include 14 PCs; a printer, scanner, and fax combination; and a cable modem line that are all currently configured as a P2P network. Frank is on a tight budget, so he would like to do the work himself. He has been conducting research and cannot decide if he should install Cat5, Cat6, or fiber. He has asked you to help with his decision.

To prepare to make recommendations, complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Then, using research you conduct on the Internet and the lab activity as references, write a 3–5-page report in which you make recommendations to Frank. Address the following:

•Compare and contrast the different cabling standards.

•Discuss the cost benefits of client/server networks.

•Define the basic concepts of network cabling.

•Recommend a network to Frank based on your research.

•Apply the concepts from the practice lab activity for this assessment.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.