Need a working and full functional code for the project- “Hand writing recognition of English alphabets”

The main objective of this project is to recognize handwritten characters of English alphabets from A to Z using this dataset from the website- https://www.kaggle.com/datasets/sachinpatel21/az-handwritten-alphabets-in-csv-format/code

Skill sets required- Python, Datascience, and Machine Learning.

I only need the working code and the output with the following details

1) I will be giving either single or multiple handwritten alphabets in an image(.jpg or .png) format as input and the model should predict the complete output accordingly.

2) I also need a demo of the project so that I can understand, explain and execute the project in front of my professors.

3) The input to the model will be given randomly by the professor and then I need to process the input, execute and show the output to them.

4) The project should be accurate in predicting the alphabets.

5) Using OCR(Optical Character Recognition) technology which recognizes text within a digital image is recommended if possible. If not any other technology used is also fine. But need to recognize the alphabets with accuracy.

6) If any plotting or graphs can be included, that can be really helpful.

Deadline: April 14th, 2023 by end of the day.

Bayesian networks model essay

 What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model? 

 Your response should be 250-300 words.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. 

xy

 Describe the culture at your organization (past or present). List the weaknesses and strengths. How does the culture of your organization influence the behavior of its members? Is the structure of your company supportive of the culture? Why do people resist change? What are your recommendations for improvements?  

use chapters 14 and 15   An Introduction to Organizational Behavior – Table of Contents (lardbucket.org) 

I have uploaded screenshots of test book

Discussion 1 Proj risk

 Chapter 1: IntroductionsChapter 2: An Overview of RiskChapter 3: Projects and Project StakeholdersInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What are examples of project risks?
  2. How do you identify risks in a project?
  3. What are the 4 risk strategies for risk remediation?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review] 

Text-

 

Title: Managing Project Risks; 464 Pages

ISBN: 978-1-119-48975-7

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards

Publisher: Wiley-Blackwell

Publication Date: 2019

Privacy and Confidentiality in Information Technology

Part 1

Assessment Instructions

Privacy and the right to privacy are becoming common topics in society. Is this a reflection of society evolving to changes in behavior, and is information technology enabling this evolution? Should privacy rights be static or change over time with societal views of privacy?

Find and research an article related to privacy using your favorite search engine. Write a 4–6-page paper including your position on privacy (for/against) including all features or elements such as laws or regulations to support your position in your paper. Use APA formatting and cite your resources.

Minimum Submission Requirements

Your document should be at least 4-6 pages, double spaced, and include title and reference pages. It must follow APA Style and contain no spelling or grammar errors.

Part 2

Assessment Instructions

Privacy and confidentiality are constantly being challenged and in some cases, taken away. Surveillance cameras are everywhere, and the NSA makes bulk collections of all calls, emails, and faxes. Is this an ethical concern or government overreach in response to terrorism? In this Assignment, you are going to explore whether these are isolated occurrences in society or a common pattern that will continue to evolve in the coming years.

Using your favorite search engine, research and review a situation or event where confidentiality and ethics were the primary concerns. Explore specifics on what was protected and how it was revealed including ethical violations. Indicate whether training or acknowledgement was known to all involved before the ethical concern occurred. An alternative assignment can be to research an event where both privacy and confidentiality were violated due to ethical concerns. Summarize your findings in a 3-4 page paper. Use APA formatting and cite your resources.

Assignment 300 words

 You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

This criterion is linked to a Learning Outcome Writing Quality

  

This criterion is linked to a Learning Outcome Writing Quality: Was the paper easy to read – well-organized, grammatically correct, correct spelling etc.? (Overall grade may be adjusted accordingly)
This criterion is linked to a Learning Outcome Quality of Data Analysis: Did you incorporate data from the case into a meaningful analysis? Do you use the numbers to evaluate alternatives and justify a recommendation? Are your calculations accurate, appropriate, and directly relate to the problem you identified?
This criterion is linked to a Learning Outcome Recommendation: How convincing is your recommended course of action? Is it justified and supported by evidence? Did you critically evaluate the recommendation in terms of pros and cons? Does the recommendation make sense given your analysis?
This criterion is linked to a Learning Outcome Alternative Identification: How plausible are the alternatives you identify? How thoughtfully are they developed? Do you address pros and cons?
This criterion is linked to a Learning Outcome Situation Analysis: Did you summarize the key factors most relevant to the case?
This criterion is linked to a Learning Outcome Problem Statement Definition: How precisely have you identified the problem? Did you identify the true problem and not just symptoms of the problem?
BUSI 275 Extra Credit (5%)
Transfer Value of Soccer Player
Student Name:
Student Number:
Instruction:
(1)   The extra credit work is due April 27th at noon, please submit through Connect. There will be no extension.
(2)   All your answers must be written in word—please copy & paste all your relevant analyses from Excel to this word document.
(3)   Please note that I do expect different students write different answers.
(4)   I will not answer any questions regarding the Extra Credit.
(5)   5% is based on the quality of your work.
You want to study factors that decide the transfer value of soccer players. The valuation of soccer players is determined by several factors, such as player characteristics and performance data. Because being equipped with talented players is essential for professional soccer team’s successful performance, professional clubs in top soccer leagues attempt to maintain a competitive squad by purchasing and selling players. Prior to a transaction, management and experts work collectively to explore both qualitative and quantitative variables to compute a fair price to be paid to (or received from) another team in exchange for a particular player. Due to the subjective nature and countless variables that are taken into account when valuing a player, the transfer value can be quite arbitrary and did not necessarily represent a player’s true market value.
The Excel file “Extra Credit_Transfer Value of Soccer Player” contains data for 77 transfers of notable offensive soccer players (i.e. midfielders and forwards) that moved to another team between 2009 and 2015. Let’s understand factors that are related to a players’ value and also build a functioning model that could predict a player’s market value.
Here are the explanation of the variables:
GBP: the player’s transfer price in British pounds
Y-5: Appearance over total number of league games (utilization ratio) five years prior to transfer
Y-4: Appearance over total number of league games four years prior to transfer
Y-3: Appearance over total number of league games three years prior to transfer
Y-2: Appearance over total number of league games two years prior to transfer
Y-1: Appearance over total number of league games one year prior to transfer
WA: weighted average of utilization ratio in league games over the past five years (seasons)
Goals: total number of goals scored in league games over the past five years
App: total number of appearance in league games over the past five years
G/A: ratio of goals to appearance in league games over the past five years
Age: player’s age at the time of transfer
Height: height of player
Pos: player’s position—OFF for offensive position, such as striker and wingers, MID for offensive midfielder
Foot: dominant foot—L for left, R for right, B for both
CR: Club ranking of the team that is selling the player in categories: 1=top eight in league ranking over the past five years; 2=below top eight in league ranking over the past five years
NR: FIFA ranking of the player’s national team in categories: 1=almost always enters round 16 in the FIFA World Cup, and has a high probability of reaching the semi-finals; 2=often enters round 16, but has a low probability of reaching the semi-finals; 3=often does not enter round 16, and has a very low chance of reaching the semi-finals.
Questions:
1.      With all the variables provided in the Excel, intuitively, discuss which ones you think are important determinants for soccer players’ transfer value. Please note that not all variables are necessarily important in this study.
2.      For some categorical variables, if you think they are important determinants for players’ transfer value, create dummy variables for them. Please note that you will only need to do this for the categorical variables you believe are important.
3.      For the variables that you think are important from question 1 and converted to dummy variables in question 2, make the correlation table and identify whether there’s any multicollinearity problem.
4.      Run regression to determine factors that are related to players’ transfer value (as measured by the variable “GBP”). Copy and paste your regression result to the word and briefly discuss the following:

 

Firewall Questionnaire

 

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?