Week 5

Part 1: Complete the following assignment in one MS word document:

Chapter 5 – 

1. What is an artificial neural network and for what types

of problems can it be used?

2. Compare artificial and biological neural networks. What

aspects of biological networks are not mimicked by artificial

ones? What aspects are similar?

3. What are the most common ANN architectures? For

what types of problems can they be used?

4. ANN can be used for both supervised and unsupervised

learning. Explain how they learn in a supervised mode

and in an unsupervised mode.

Exercise questions : 

exercise 6:  

Go to Google Scholar (scholar.google.com). Conduct

a search to find two papers written in the last five years

that compare and contrast multiple machine-learning

methods for a given problem domain. Observe commonalities

and differences among their findings and

prepare a report to summarize your understanding.

  Internet exercise #7 (go to  neuroshell.com click on the examples and look at the current examples listed, the Gee Whiz example is no longer on the page).

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

Part 2:

Create a discussion thread (with your name) and answer the following question:

Discussion (Chapter 5): What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.
Your response should be 250-300 words.  Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

250 words

 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/
https://www.techrepublic.com/

CIS 3400

 

A consulting company has a lunch room, 12 conference rooms, 6 LCD projectors, 3 portable PCs, etc. They need to be able to schedule each of these resources for a given day and time period and avoid conflicting use of resources. Also, management would like reporting on resource utilization per week, month, year. They are also considering renting out resources to other companies if resource utilization is low. Queries might include:

When is the next day resource X is free between 1:00 and 5:00.

How many hours per week on average is conference room X occupied.

Discussion 7- Exe Proj

Assigned Readings:

Chapter 7. Risk Management 

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. Give some examples of projects using each of the risk mitigation strategies (accept, minimize, share, or transfer).  How successful were these strategies?  In hindsight, would another approach have been better?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] 

 [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word-version of the paper for APA review]

Text-

Title: Project Management ISBN: 9780134730332 Authors: Pinto Publisher: Pearson Edition: 5TH 19 

Discussion

If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important. (300 words + References please)

chapter 8

10 hours 

half a page

 

Access your browser’s security settings and configure the browser to refuse all cookies or to prompt you before allowing a cookie. Restart the browser; then, visit several different websites. Be sure to visit popular sites that provide rich content. How did the setting affect your browsing? 

someone determines exactly how to configure a browser’s security, knowing they may interfere with the program’s use? 

Exp19_Excel_Ch04_ML1_Pet_Supplies

 

Exp19_Excel_Ch04_ML1_Pet_Supplies

 

Project Description:

You are the inventory manager for Crafton’s Pet Supplies. You are currently preforming analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.