Probability Theory and Introductory Statistics

Find a dataset (must have multiple columns with data at the interval or ratio measurement level), and examine and test the relationships between several variables. Provide the R codes in the R-script file under the sub-heading Module 5, and the statistical outputs under the sub-heading “Module 5” in the Word file. In general, your statistical outputs should be titled and labeled so that they can stand on their own (and can be understood by anyone who looks at them for the first time).

  1. Produce and export at least one correlation table or correlation chart. A correlation chart is diagnostic, and should not be larger than 5 variables for reporting purposes. Why is this? Provide several sentences describing the key analytical findings.
  2. Produce and export at least one regression table. You may pick your own outcome and predictor variables. How does regression analysis differ from correlation analysis? Provide several sentences discussing the key results.

Submit a report that examines parts 1 and 2 and your R script.

Submit a report that examines parts 1 and 2 and your R script.

Submit a report that examines parts 1 and 2 and your R script.

Submit a report that examines parts 1 and 2 and your R script.

unit 10 db#2+ 2 responses

I need initial db post and responses to 2 of my classmates.

 

Topic 2: Importance of Cybersecurity

Do you think cybersecurity will be more important or less important in the future? Explain your answer.

Final Report

I have already prepared the document all you have do is contents and check whether it is in IEEE format (one column) or not 

IG Wk8

2 full pages (550 words)

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

 With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review of at least 2 other students’ posts.

Internet Privacy

 

In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access. What are the side effects of this action? 

CSE about AI

 Uplaod the answer as a pdf. The slides might help.

Part 1: State Spaces

1.1) [1pt] You will need to create a small problem to work from (i.e., find an initial state that is only a few moves away from a goal state).

Luckily, for the 8-puzzle this is straightforward. Start from the goal state and move tiles around several times to “mix up” the board

For example (See attached pictureRYM@…)

Now you give it a try. Start from the goal state and move the tiles 3 times to create an initial state.

1.2) [4pts] Now draw out the search space starting from the initial state you created in (1.1). Draw 4 levels of the tree (we need a limit since the tree would otherwise be infinite in size), meaning the root node (initial state) and 3 levels of successor states. When considering successor states, evaluate moves (and writing them left-to-right) in the following order:

  1. Move a tile up into the blank space
  2. Move a tile down into the blank space
  3. Move a tile left into the blank space
  4. Move a tile right into the blank space

Indicate in some way which nodes are goal states and which nodes have further successors (which you won’t explore because they are past 4 levels).

The idea here is to reproduce something like the trees demonstrated on the slides (e.g., slide 11 in Uninformed Search).

I highly recommend putting the first set of successors (2nd level of tree) on separate pages, so you have enough room to finish the tree!

Part 2: Uninformed Search

Now we move on to some actual algorithms.

2.1) [4pts] Using your initial state from Part 1, show how Breadth First Search (BFS) would explore states.

Show your work in detail, including the contents of the Open and Closed sets after each iteration.

Because the open set will grow quite large, you may abbreviate by leaving out parts of the open and closed sets which don’t change. However, make sure it is clear what is leaving the open set and what enters the open/closed sets (and where!).

Hint: As you work through the BFS operation, trace which states it explores on your tree from Part 1. Is it following the pattern you expect? If not, maybe you’ve made a mistake?

If you find yourself needing to do more than 10 iterations to find a goal state, then after the 10th iteration, you may simply report which state is visited, rather than the entire contents of the Open & Closed sets.

2.2) [0.5pts] If you had used Uniform Cost Search (UCS) instead of BFS above, how would your results change?

2.3) [4pts] Now repeat (2.1) but using Depth-Limited Search (DLS) with a depth limit of 4.

Remember that DLS needs to know the depth in the search tree of each state (number of actions to reach), so you will need to include that extra information in your open set. (The formatting is up to you, but you could use the UCS example on the slides for inspiration.)

Hint: When you generate successor (children) states, how do you know what their depth is? Can you calculate their depth if you know the predecessor (parent) depth?

2.4) [4pts] Again, repeat (2.1) using Iterative Deepening Search (IDS).

Keep in mind, IDS runs DLS multiple times with increasing depth limits, so this problem will be somewhat like repeating (2.3) multiple times. Make sure it is clear each time where the depth limit changes (and a new run of DLS starts).

Hint: You may be able to re-use (copy-paste) many pieces of your work from (2.3) to save time.

Part 3: Informed Search

3.1) [6pts] Finally, repeat (2.1) using A* search using the “misplaced tiles” heuristic (see slide 25).

Note, as with DLS, A* requires tracking extra information about a state in order to operate. At a minimum, you will need to track the total estimated path cost for each node ( f ). But I highly recommend tracking the path cost so far ( g ) as well, as it will make you’re job significantly easier.

Hint: The path cost so far ( g ) has a very strong relationship with the depth from DLS…

Journal entry

– Pick one of the following terms for your research: analyzability, core technology, interdependence, joint optimization, lean manufacturing, noncore technology, service technology, small-batch production, smart factories, or technical complexity. 

–  The paper should have a ‘Definition, Summary and Discussion’ headings ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with a 0% similarity index