Pick one of the following for your Big Data Research paper?

 Articles to read:

 

Marcu, D., & Danubianu, M. (2019). Learning Analytics or Educational Data Mining? This is the Question. BRAIN: Broad Research in Artificial Intelligence & Neuroscience, 10, 1–14. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=139367236&site=eds-live

Hariri,  R.H., Fredericks, E.M. & Bowers, K.M. (2019). Uncertainty in big  data analytics: survey, opportunities, and challenges. Journal of Big Data, 6: 44. https://doi.org/10.1186/s40537-019-0206-3

Question:

While  this weeks topic highlighted the uncertainty of Big Data, the author  identified the following as areas for future research.  Pick one of the  following for your Research paper:

  • Additional  study must be performed on the interactions between each big data  characteristic, as they do not exist separately but naturally interact  in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New  techniques and algorithms must be developed in ML and NLP to handle the  real-time needs for decisions made based on enormous amounts of data.
  • More  work is necessary on how to efficiently model uncertainty in ML and  NLP, as well as how to represent uncertainty resulting from big data  analytics.
  • Since  the CI algorithms are able to find an approximate solution within a  reasonable time, they have been used to tackle ML problems and  uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

various ways to improve system development productivity

Discuss the various ways to improve system development productivity.

Forum rules:

  • Post your answer to the forum questions by 11:59pm EST on Thursday 
    • Your answer must be substantive, which usually requires 300 words or more
    • Your answer must be well written and well organized
    • Your answer must include one properly formatted APA in-text citation to a scholarly reference. The full reference must be provided at the end of your answer with a link if one is available. 
    • No attachments will be graded

Post two replies to your classmates by 11:59pm EST on Sunday 

  • Your replies should be meaningful, which means they should engage your classmate in discussion focused on the forum questions. Usually this requires 150 words or more.
  • No forum posts made after 11:59pm EST on Sunday will be graded 

This one IP is worth 200 points. Parts 1 and 2 together are worth 100 points. Part 3, which is “summative” is worth 100 points.

 Note: This one IP is worth 200 points. Parts 1 and 2 together are worth 100 points. Part 3, which is “summative” is worth 100 points. Part 1: In a two-phase, total-order multicast system, messages are sent in the following sequence from node S to G1 and G2. G1 and G2 are the members of the group. 1. S sends m1 to G1 2. S sends m1 to G2 3. S sends m2 to G2 4. S sends m2 to G1 Use the basic implementation of the Lamport clock. The clock s at each node start at: S: 4, G1: 6, G2: 1 Show the exchange of messages and their acknowledgments in a clock diagram using the basic implementation of Lamport’s clock. In which order and at what times are m1 and m2 delivered? Part 2. Draw a state diagram of Maekawa’s voting algorithm on the slide “Maekawa’s algorithm” in the “Distributed mutual exclusion” slide set. Note that the state diagram is from the point of view of any one of the nodes, called “this” node below. The state diagram cannot show the states of other nodes. i) Start with the basic case where “this” node wants the lock, gets it, and then releases it, and no other node wants the lock at the same time. In this case, “this” node goes through all the states in this order: Released and not voted Wanted and not voted Wanted and voted Held and voted Released and voted (Back to) Released and not voted Events are: acquire for when “this” node wants the lock release for when “this” node gives up the lock. 8/7/20 3:01 PM 15 request_received, reply_received, and release_received when a message from any node arrives at “this” node. The state diagram is similar the one of Ricart and Agrawala’s state machine (in the Distributed Mutual Exclusion PowerPoint deck) but has more states. *** If you do part i) more or less correctly, you will earn most of the points. *** ii) The complete solution includes the situations where “this” node votes on requests from other nodes. The states are the same as above, but there are additional transitions and actions. Use the “Maekawa scenario” slide in the Distributed Mutual Exclusion slide set, or Fig. D-10 in the Study Guide. Warning: There is an incorrect solution for this problem on the Web. It has extra, incorrect states. Part 3 (100 points): Summarize the course in your own words in an essay of 5-6 pages or so. Feel free to reuse any relevant DB posts as well as Unit 3 IP, but please correct any errors found. Edit it all into one paper that reads nicely from top to bottom and is styled according to APA. Include at a minimum: • How threads and safe objects interact. This can be in general or based on Ada or Java. • Entity-life modeling: the idea of finding event-sequence models of the domain and map them onto thread architectures in the software. Deadlock prevention. • The use of logical clocks for communication and/or for distributed mutual exclusion.  

Create a brochure for parents and community members that illustrates the main points of Sheltered English Immersion

  

Create a brochure for parents and community members that illustrates the main points of Sheltered English Immersion, Structured English Immersion, and the English as a Second Language Pull-out model. Briefly define each and explain why each of these models are utilized. What are the benefits of each model?

Include 3-5 sources from your research to support this assignment.

APA format is required for essays only. Solid academic writing is always expected. For all assignment delivery options, documentation of sources should be presented using APA formatting guidelines,

SOFTWARE CRACKERS

Hello will need 500-700 word, double spaced, written in APA format, showing sources and a bibliography and a 10 slide PPT

Fuzzy logic discussion

 Fuzzy logic modeling has many advantages over the conventional rule induction algorithm. For the discussion forum, you work in the admissions office of a University. There are a large number of applicants to the University. You classify them into three clusters-admitted, rejected, and those who should be admitted. For the third cluster, how would you handle this taking into consideration the fuzzy logic modeling? Would ranking be a consideration?  

BUS5WB – Data Warehousing and Big Data Assignment 02: OLAP, Cubes, and Insights

The second assignment focuses on the agility of data warehouse developments, redesigning an existing dimensional model, and the use SSDT tools and techniques to generate business insights. Your ability to correctly apply these tools to a business use case will be assessed.

Task 1: Agile data warehouse development approach

Conduct a critical evaluation of the dimensional models that you designed in assignment 01 to formulate an agile development approach for the corresponding data warehouses. The lecture on data warehouse lifecycle provides a basis for this formulation but you are required to reference external reading on agile and cloud data warehouse solutions (preferably Azure) to determine the critical components that will address the business needs with agile delivery.

The following business case applies to Tasks 2 and 3: 

The CIO of Valeur, a large national supermarket/retail store chain has recently introduced a loyalty card program and keen to gain a more comprehensive understanding of the organisation’s customer base through traditional transactional data as well as the newer and effective demographic analysis techniques. The customer relationship management (CRM) team working under her supervision have already put together a summarised data warehouse containing some transaction data and customer demographics. Although the data is accurate and complete, the CIO believes the structure is not. She feels there’s more information that can be captured by the warehouse. She has two main business problems in mind. Firstly, improving the current dimensional model/ warehouse to capture all relevant information that applies to customers, such as demographics. Secondly, using current data in the warehouse to better understand the customer base by identifying customer behaviours and thereby potential sales and marketing opportunities.

Task 2: Dimensional model redesign

Study the given dimensional model to determine what is lacking in response to the business need. Identify potential improvements to the dimensional model. This can be in the form of new attributes, new dimensions, new measures or the use of dimension design techniques. Present your recommendations with supporting evidence and the new dimensional model.

Task 3: Demonstration of Analysis Tools

The data warehouse (ValeurDW) is accessible from the WB server.

Use the knowledge and experience gained from tutorials 7-10, to demonstrate each of the seven analysis

technique/tool – 1) SSAS, 2) Cube Features, 3) SSRS, 4) MDX, 5) SSDT Data mining, 6) Excel Power Pivot, and 7) PowerBI, by conducting a comprehensive analysis of customer behaviours and thereby potential sales and marketing opportunities.

It is anticipated that you will demonstrate your proficiency with advanced analysis approaches rather than simple and straightforward querying. Each demonstration should lead towards an insight/recommendation of business value. A minimum of seven demonstrations is expected, preferably in increasing complexity and increasing decision value.

computing

 
File submission: MS PowerPoint 2016 Practical Exam – Characters in the evolution of computers 

 
Objective of the activity  Through this activity the student will develop a presentation with the following characteristics:  “Theme” different “layouts” (additional to Title Slide “and Title and Content” Elements such as: text, images, audio or video transition movements to “slides” and animation movements in text and images Header Comply with the 10/20/30 rule Meets the 1/7/7 rule Using the note area 

 
Instructions  Before doing the exercise, access the resources, including the tutorials. This activity is graded only once. The activity is individual.  The purpose of this activity is for the student to develop a presentation using MS PowerPoint. 

 
What are we going to do?  For the MS PowerPoint exam they must create the presentation on the Personalities in the Evolution of Computers material. How are we going to do the activity?  Read the instructions and the evaluation criteria. Access the application to create presentations. Create templates with the text given for each one. Remember the 10/20/30 and 1/7/7 rules. Apply “background” to the entire presentation. Add images and / or photos. Apply transition movements in the “slides” and animation movement in text and graphics. Once the presentation is developed, save the final document on your computer with the title of the selected poem. The name of the document should include your name, for example: Characters in Modern Evolution – Maria Olivero.  Check that your presentation meets the evaluation criteria stated in the rubric. 

 

The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund).

 

Basic review resource

Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b

 

Ethical Hacking week 1

 

Wk 1 Research Assignment

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.Click on the LINK above to submit your WORD document for this week’s assignment. 

 

The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

When Ethical Hacking Can’t Compete

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/