Please go through the attachment for details.
Research Paper: Building an economy: Government planning vs. entrepreneurial innovation
Research Paper: Building an economy: Government planning vs. entrepreneurial innovation
Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )
Once you find the article, you will read it and write a review of it. This is considered a research article review.
Your paper should meet these requirements:
- Be approximately 3-4 pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Data Science
Classification: Basic Concepts
Decision Tree Induction
Bayes Classification Methods
Rule-Based Classification
Assignment 4
1- Consider the data in the following table:
TID
Home Owner
Marital Status
Annual Income
Defaulted Borrower
1
Yes
Single
[120 – < 150K]No
2
No
Married
[90 – < 120K]No
3
No
Single
[60 – < 90K]No
4
Yes
Married
[120 – < 150K]No
5
No
Divorced
[90 – < 120K]Yes
6
No
Married
[60 – < 90K]No
7
Yes
Divorced
[120 – < 150K]No
8
No
Single
[90 – < 120K]Yes
9
No
Married
[60 – < 90K]No
10
No
Single
[90 – < 120K]Yes
Let Defaulted Borrower be the class label attribute.
a) Given a data tuple X = (Home Owner= No, Marital Status= Married, Income= $120K). What would a naive Bayesian classification of the Defaulted Borrower for the tuple be?
2- Consider the training example in the following table for a binary classification problem.
Customer ID
Gender
Car Type
Shirt Size
Class
1
M
Family
S
C0
2
M
Sports
M
C0
3
M
Sports
M
C0
4
M
Sports
L
C0
5
M
Sports
XL
C0
6
M
Sports
XL
C0
7
F
Sports
S
C0
8
F
Sports
S
C0
9
F
Sports
M
C0
10
F
Luxury
L
C0
11
M
Family
L
C1
12
M
Family
XL
C1
13
M
Family
M
C1
14
M
Luxury
XL
C1
15
F
Luxury
S
C1
16
F
Luxury
S
C1
17
F
Luxury
M
C1
18
F
Luxury
M
C1
19
F
Luxury
M
C1
20
F
Luxury
L
C1
a) Find the gain for Gender, Car Type, and Shirt Size.
b) Which attribute will be selected as the splitting attribute?
assignment-9
Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
Project paper , Due date 26th September
Provide an outline for your Chapter 2. Also write the Introduction to the Topic of your dissertation centered on the Problem for your research.
Based on below topics
Dissertation Topic
1.) Information Systems
2.) Database
Note: Minimum 600 words not including title and reference page. References should be taken from peer revived
Digital Forensics
Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.
Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession.
- On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent.
- On the Contrary-B
Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent.
- On the Contrary-C
Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.
- On the Contrary-D
The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America.
- The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered.
- The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
- During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.
- After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002.
- On the Contrary-E
The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.
Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:
1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.
1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.
1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences.
Database IT244
1Draw the corresponding ERD for the following Employee Database
2Normalize the following Schema with the given functional dependencies into BCNF
3Explain in your own words why the Student-Dept relation is not in 4NF. Then, convert the Student-Dept relation in 4NF. Also, provide the justification for each step you perform during normalization (4NF). Note: The SportActivity here means any sport a student is participating in. For example, a student with ID = 123 can participate in soccer and badminton
4In your own word, explain why do designers use Denormalization? What is the limitation of using Denormalization? Name and explain a better alternative approach than Denormalization.
Organizational Analysis
Each student will write an 5-7 page paper on a conflict that he or she experienced in an organizational setting. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font. The organizational analysis will contain the following sections:
- Background and history that led to the conflict?
- How/why did the conflict escalate?
- How was the conflict resolved?
- What would the student have done differently, based on what he or she has learned in the class?
Network Security Controls Recommendations
network security controls
Access control Assignment 9
Discuss the benefits of technology to support Access Control.
Length, 2 – 3 pages.
All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.
Please reference the rubric for grading.