A postfix expression is an expression in which each operator follows its operands. Table 13.4 shows several examples of postfix expressions. The grouping marks under each expression should help you visualize the operands for each operator. The more familiar infix expression corresponding to each postfix expression is also shown. The advantage of the postfix form is that there is no need to group subexpressions in parentheses or to consider operator precedence. The grouping marks in Table 13.4 are only for our convenience and are not required. You may have used pocket calculators that require the entry of expressions in postfix form. Use an adaptation of your stack library from Project 3 to write a program that simulates the operation of a calculator by scanning an integer expression in postfix form and displaying its result. Your program should push each integer operand onto the stack. When an operator is encountered, the top two operands are popped, the operation is performed on its operands, and the result is pushed back onto the stack. The final result should be the only value remaining on the stack when the end of the expression is reached.
Security Policy Plan
This is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create or make all necessary assumptions needed for the completion of this assignment.
Submission Requirements
Write a 3–5 page paper in which you:
- Create a cybersecurity policy describing the principle, the objective, and policy statement for the law firm’s company network.
- Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.
- Suggest the cybersecurity policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.
- Determine the security testing methodology you would use to facilitate the assessment of technical controls.
Section 2
Complete the following:
- Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:
- Tasks, subtasks, resources, and predecessors.
- An outline of the planning, analysis, design, and implementation phases.
- The use of cybersecurity in the information systems development life cycle.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
The specific course learning outcome associated with this assignment is:
Discussion
Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
cloud computing
Project overview
As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure.
This project will be completed in a series of steps, in which you will explore cloud technologies and cloud architecture and how they can be used in the organization.
Your presentation with audio narration will educate the executives on cloud computing and its benefits (and drawbacks) to the company. To complete your analysis, you will need to cover the following:
- description of cloud computing
- basic capabilities of the cloud
- advantages and disadvantages of cloud computing
- analysis of economic implications
- IT business needs
- SWOT analysis
There are six steps in this project. In your final narrated PowerPoint presentation, you will be assessed on your ability to convey your understanding of cloud computing and how it can be used to benefit your organization, explaining the advantages and disadvantages of cloud computing and providing a detailed business analysis covering financial considerations, business requirements, and an analysis of threats and opportunities.
Step 1: Describe Cloud Computing
Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate BallotOnline’s future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.
Step 2: Research Advantages and Disadvantages of Cloud Computing
Now that you have defined important terms and summarized the basic capabilities of the cloud, it is time to explore the advantages and disadvantages of cloud computing.
Currently, BallotOnline is running at full capacity and needs to expand its IT infrastructure to accommodate its growing needs. Instead of expanding current on-premise IT infrastructure by building or acquiring a new data center, Sophia has suggested that the cloud may be more efficient and cost-effective than adding more traditional physical data center space.
This information that you research will be useful in your final presentation in the last step.
When you have completed the research, move to the next step, where you will consider the budgetary aspects of a move to the cloud and the implications for the organization.
Step 3: Analyze Economic Implications
Now that you have weighed the benefits and drawbacks of cloud computing, it’s time to take a close look at the economic implications of a move to the cloud. All organizations (for-profit, nonprofit, or government) have finite budgets. Management must allocate these financial assets appropriately so that the leaders can make sound business decisions and meet the objectives of the organization.
Information technology (IT) is a key strategic function to help support the objectives of an organization. Businesses first used information systems to replace paper-based methods of helping management perform these functions, and that use continues today. Managers must be able to understand different IT models to make the best financial investment decisions for the organization.
The financial requirements for the cloud computing model are different than the financial requirements for an on-premise model. Cloud computing shifts budgets to a pure operating expense model, whereas the traditional on-premise computing model requires both capital and operating expense allocations.
Several free calculators to help estimate the cost of cloud services exist on the web, including the AWS Total Cost of Ownership (TCO) Calculator and Azure TCO Calculator. Alternatively, you may find other calculators to estimate your cloud cost. Most cloud providers have their own cloud cost estimator tools. If the calculator that you selected does not show on-premise data, then you can recalculate using one of the other calculators that do provide this data.
For your economic analysis, enter the information from BallotOnline’s IT Budget and Infrastructure Summary into your chosen calculator to estimate TCO for the current physical IT infrastructure configuration. Then estimate TCO for a comparable configuration in the cloud to estimate the potential cost savings.
Write the summary of the economic implications, showing the savings and how you arrived at them, and upload it to the dropbox below.
Step 4: Define the IT Business Requirements
After considering the economic aspects of the cloud, the next logical step is to narrow the particular requirements of cloud computing for the organization. It is important that your presentation works toward building a business case for cloud computing.
Your presentation must address BallotOnline’s business requirements and critical IT requirements related to data storage. Make sure you classify the requirements into functional (behavior) and nonfunctional, as per the requirements definition link.
Step 5: Prepare a SWOT Analysis
In this step, you will apply the information gathered in the business analysis to assess the benefits and possible drawbacks of adopting cloud infrastructure for BallotOnline.
Take Note
Your supervisor, Sophia, recommends that you include a SWOT analysis in your presentation, since the BallotOnline company executives will want you to go over both the advantages and disadvantages of cloud adoption and any important internal and external factors that may influence the success of the project.
Prepare a Presentation on Benefits and Possible Drawbacks of Adopting Cloud Infrastructure
In this step, you will prepare your presentation for the BallotOnline executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.
Create summary tables that address relevant factors related to COVID-19
COVID-19 Open Research Dataset Challenge (CORD-19)
An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House
(1) FULL-LENGTH PROJECT
Dataset Description
In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related coronaviruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.
Call to Action
We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.
A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.
Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights into these questions.
In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!
Kaggle Website:
https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge
Assignment Length (word count): at least 15 pages.
References: At least 10 peer-reviewed, scholarly journal references.
Policy, Legal, Ethics and Cmplc
Your Research Project on the surveillance state consists of two parts:
1 a Powerpoint presentation consisting of at least 12 slides not including title and references.
2. 750 word research paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.
Do not double space.
You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.
Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software.
The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.
Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions
Assignment1010
What kind of user training should be conducted to deal with the issue of noise (not the electrical kind). How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents? What effects would false positives have on an organization?
PLEASE USE THE ATTACHED TEMPLATE
Building an AI machine/Deep learning application
- Part 1 –
- Following is the link of the Project and Dataset :
https://www.analyticsvidhya.com/blog/2016/06/quick-guide-build-recommendation-engine-python/
- Run the code several times and show the intended output…you also need to EXPLAIN the output…
- You will also need to provide output for the following:
- Python file containing your code…
- Dimensions of the data…
- Sample of the data…
- Statistical summary of the data…
- Class distribution…
- One univariate and one multivariate diagram…
- Decision Tree…explain the best depth and why?…
- Results of training and new data, 80%-20% split…
- Accuracy report…what is it telling us?…
- Confusion matrix…what is it telling us?…
- Classification report…what is it telling us?…
- Results of training and new data, 50%-50% split…
- Accuracy report…what is it telling us?…
- Confusion matrix…what is it telling us?…
- Classification report…what is it telling us?…
- Part 2 – Updated Code…
- Now that you have a working base of code, let’s apply it to a “real world” scenario…
- Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…
- Update the original application so that it “works” for the NEW application…
- In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…
- YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.
- Run the code several times and show the intended output…you also need to EXPLAIN the output…
- You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:
- Python file containing your code…
- Dimensions of the data…
- Sample of the data…
- Statistical summary of the data…
- Class distribution…
- One univariate and one multivariate diagram…
- Decision Tree…explain the best depth and why?…
- Results of training and new data, 80%-20% split…
- Accuracy report…what is it telling us?…
- Confusion matrix…what is it telling us?…
- Classification report…what is it telling us?…
- Results of training and new data, 50%-50% split…
- Accuracy report…what is it telling us?…
- Confusion matrix…what is it telling us?…
- Classification report…what is it telling us?…
I Need Both Should be in 2 Separate documents.
Question 1:
Using the Web or other resources, research an example of Cyber Terrorism.
Write a brief Discussion describing the terrorism attack and it’s the aftermath. Comment on ways the attack could have been prevented. Explain between 200 and 300 words.
Question 2 :
Write an essay of at least 500 words discussing how a blockchain implementation would improve data security in the military, education, or another context.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered, or another list format.
Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.