Capstone project

I need to complete a capstone project in order to graduate. 

CAR 490 Capstone CSIS

Student Leadership Model

This capstone
follows a student leadership and industry partner teaming approach. In the
student leadership model, faculty do not identify or develop the project topics
and scope for the students. This capstone will be a driven by the student and
supported by a faculty member.

Learning Objectives

The learning
objectives for this capstone are:

1) Enhance
independent thinking by engaging in projects that further develop competencies
acquired in pre-requisite courses.

2) Further
develop critical thinking skills required to solve open ended problems related
to design, analysis, and/or construction of projects.

3) Further
develop skills associated with project management such as developing,
implementing, and adjusting a project plan or schedule, clearly defining scope
of work, and estimating time and costs required to complete a project.

4) Further
develop communication skills required to produce organized documentation,
graphic illustrations, professional presentations, and clear and concise
project reports.

Phases of
the Capstone

This capstone will follow a SDLC (Software Development Life Cycle)
approach. The following phases to cover include:

         
Requirement Gathering and Analysis

         
Design

         
Implementation or Coding

         
Testing

         
Deployment

         
Maintenance

Capstone Timeline

The capstone will follow the timeline below:

Week 1 Requirement Gathering and Analysis Expectations:

         
Consider the following areas to build off of:
software (programming or app), website, database, data analytics, or systems
analysis. You may suggest another area as well based on your interests and
career goals.

         
Investigate the needs

         
Write a project statement including:

o  
Define the problem/need

o  
Why is this project/problem worth
doing/solving?

o  
What do you know already that can be applied
to the problem?

o  
What do you need to know more about to solve
the problem?

o  
Develop a timeline to producing the solution

       

Week 2 Design Expectations:

         
Write up the design method including the
following:

o  
How are you going to go about solving it?

o  
What are the final deliverables for the
project?

o  
Define the user requirements for the solution

o  
What is the system architecture and components
this solution is using?

          

Week 3 Implementation and Coding Expectations:

         
Move forward with proposed and approved
technology solutions

          

         

Week 4 Implementation and Coding Expectations:

         
Move forward with proposed and approved
technology solutions

         
Integrate any feedback from the previous week

          

Week 5 Implementation and Coding Expectations:

         
Move forward with proposed and approved
technology solutions

         
Integrate any feedback from the previous week

         
Submit work for review

         
Check in with instructor for brainstorming and
support

         
Submit timesheet

Week 6 Testing Expectations:

         
Create a series of test questions/scenarios
for a user to perform using the solution/project developed

         
Have a user test the solution/project

         
Submit user evaluation, report any needed
changes, submit a plan to implement needed changes

          

Week 7 Implementation and Coding Expectations:

         
Integrate improvements/changes needed based on
user testing

         
Submit work for review

         

Week 8 Testing Expectations:

         
Have a user test the solution/project

         
Submit user evaluation, report any needed
changes, submit a plan to implement needed changes

         

Week 9 Implementation and Coding Expectations:

         
Integrate improvements/changes needed based on
user testing

Week 10 Deployment Expectations:

         
Develop any necessary training/support guides
for solution

         
Walkthrough all solution components with instructor

          

ML Project using Bayesian networks

Purpose:  

This project will expose you to inference using Bayesian networks. Bayesian networks capture causal relationships and are widely used in fault diagnosis across a wide variety of applications. A Bayesian network can be represented by a directed graph which will model causal relationships between variables. A useful tool to represent and traverse a graph is NetworkX (NetworkX — NetworkX documentation) which contains a comprehensive library of graph types and graph algorithms written in Python. The application that we will be targeting is Car fault diagnosis which was introduced in class. The fundamental issue in such diagnosis applications is to discover the causes or underlying reasons for the fault to occur and to rank these reasons in terms of their importance.

In this application we will be exploring the reasons behind: a) the car not starting and the probability that this event takes place; and b) under what conditions the car battery becomes flat and the likelihood of this occurring.

Project Requirements:

R1 

Use Networkx in Google Colab and represent the network as shown below:

Attach probability tables to each node as specified in the Project 3 discussion document. Visualize the network using Networkx and show the nodes and edges. You do not have to show the probability tables you created but this of course will be embedded in your code. The coloring used in the figure above does not need to be reproduced. Instead, use a neutral color of blue to shade the nodes. Make sure that your edges show directionality.

R2

Compute the probability P (-cs, +ab, +fb)

R3

Compute the probability P (-cs, +ab)

R4

Compute the probability P(-cs, +fb)

R5

For the battery going flat, which of the factors is more important, battery dead or not charging?

Note: 

  1. Use the starter code provided for this project. This is essential as many of you will not be familiar with NetworkX.
  2. I strongly recommend that you read the Project 3 Discussion Document as it covers not just the probability table creation but also what formulae needs to be used to compute the answers to requirements R2 to R5.

Cultural Orientation Paper

 

Compose a Cultural Orientation Paper. Using concepts from Schein (Chapters 1–2) and Bolman and Deal (Chapter 1), write a five- to six-page paper that describes the culture of your current organization (or an organization which you have been a part of in the past).

While this paper should be academic in nature (using properly-cited quotations and paraphrases throughout), assume that your instructor is about to join the organization! With that in mind, write it as a “cultural orientation letter” to him or her that addresses, at very least, the following:

a.    Explain the organizational culture in detail using Schein’s three levels of culture (approximately two pages).

b.    Which of Bolman and Deal’s four frames (see page 20) best describe your culture? Why? Which culture is primary and why is it primary? Which is secondary and why is it secondary? (This should be approximately one page.)

c.    What aspects of the organizational culture do you appreciate and why (approximately half a page)?

d.    What aspects of the organizational culture do you not appreciate and why (approximately half a page)?

e.    If a new manager (whether mid- or senior-level) were to survive and thrive within your organizational culture, list a variety of dos and don’ts that he or she should follow (approximately one page).

Include a title page, an abstract, section titles, a title page, and a references page—all in APA format.

who can complete this is a timely manner?

  In a 1-2 page Word document, respond to the following: Location Reporting and Privacy

You can use location-based tools to help you find your car or the closest gas station. However, some people see location-based tools as an invasion of privacy. Discuss two pros and two cons of location-based tools.

Disaster and recover planning

 

Please provide references for your original postings in APA format.

1. Discuss options for testing a BCP/DRP plan (Describe at least two options). Of your options, which would provide the greatest value?

2. How often should a plan be reviewed and be whom?

What is the purpose and benefits of

  

(a) What is the purpose and benefits of Clustering data in a file?

(b) What is the code for creating a cluster and associated tables in Oracle

(d) What are the advantages/disadvantages of horizontal and vertical partitioning?

(e) Describe RAID and outline the benefits of implementing such an installation. 

(f) In the large Enterprise two functions have evolved to manage the Enterprise Database – Data Administration and Database Administration. Provide definitions and outline the activities for both of these functions and outline how they have evolved with the changes in relational database technology solutions and in organisations’ requirements for information. 

(g) Database Security is a huge challenge to the large Enterprise, outline the threats that exist to data and the features included in modern DBMS to enhance data security. 

(h) Transaction control is vital in a busy database, outline transaction ACID properties. 

(i) Explain Locking and outline the locking levels and types of locks available in DBMS today.

(j) What is deadlock and how would you prevent it?

Research report

 

 Need to present a research reports on 

1. Sarbanes-Oxley Act of 2002

2. Solar Winds

 Both reports should be written with a word count of 70-105 words(not more than the count provided) and should provide a URL reference link too . 

Note : NO PLAGIARISM 

Should have minimum of 3 statements which describes the information about the report.

Tips: Should be in simple own words and no usage of critical words and attached the file to know in detail to write on it. This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

Deadline Sep16, 2022 12:00Pm.Cst

Big Data and Blockchain Technology

Question 1

 The concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings . Use proper citations and references in your post.

Question 2 :

 There are several emerging concepts that are using  Big Data and Blockchain  Technology. Please search the internet  and highlight 5 emerging concepts that are exploring the use of Blockchain  and Big Data.Conclude your paper with a detailed conclusion section. The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.