Research Report

 Quality research report (min. 2500 words / Docx or PDF format only), as measured by a provided rubric, that will provide a comparative analysis of deep learning, reinforced learning, and natural language processing (using peer-reviewed studies). Proper APA citations are required. 

Data Mining and Data Warehousing

 Individual  Project Proposal:

write any topic about “data mining and data warehousing”. (a real business and identify a problem or opportunity, where you can provide a viable database solution

a. Create a Project Proposal b. Must include a Project Plan c. Outline of business justifications and benefits )

one or one and half page proposal 

“Internet Security: From Stand-alone Computers to Web-based Systems”

  

For this writing assignment you will create a paper entitled, “Internet Security: From Stand-alone Computers to Web-based Systems”. The contents of the paper will be based on subjects covered in the textbook. The goal of creating this paper is for you to learn more in-depth information about various subjects covered in the textbook.

From each of the chapters 1 through 8 in the textbook pick one major section that is of interest to you. For each section that you selected, do the following:

Use the chapter number and the title of the section in the textbook as the title for that part in your paper, for example, “(Chapter 1) Client/Server Computing”. Then in 200 – 250 words, either confirm the information given in the section or add to the information in the section (or both). Find this material by using the references listed in the back of the textbook and by searching on the WWW. Your confirmation or addition of information should be based on primary sources rather than information from other textbooks or from magazine (i.e., web-zine) reviews. Do not use Wikipedia or other such websites as a reference. Also, do not copy/paste sentences from the textbook into your paper.

Your completed paper should follow APA format. The paper should consist of eight parts (one for each chapter) and contain a total of 1600 to 2000 words. 

Create your paper in a Microsoft Word document, and submit the Word file on the course website.

List the Following Briefly in Six sentences each

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

QUALITATIVE Journal Article Reviews Here

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  

  Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability, and the implications of the results.  Does the piece lead to further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

Healthcare Networking and Security

1. Design a detailed disaster preparedness for the network of a 120 inpatient bed facility.

2. Using the core functions of the National Institute of Standards and Technology (NIST) framework, design a security plan on how to better protect the facility’s cyber security above.

3. Using draw.io, design a network topology to include a DM and explain 2 security implications of the DMZ.

Note: You MUST have a cover page with all the details for a standard paper. All your citations and references MUST be properly formatted in accordance with the latest APA standards. Your work MUST to logical, technical, and reflective of graduate writing.

Ellison Private Elementary School

    

 Ellison Private Elementary School has three classrooms in each of nine grades, kindergarten(grade 0) through grade 8, and allows parents to pay tuition over the nine-month school year. Design the application that outputs nine tuition payment coupons for each of the 27 classrooms. Each coupon should contain the grade number (0 through 8), the classroom number (1 through 3), the month (1 through 9), and the amount of tuition due. Tuition for kindergarten is $80 per month. Tuition for the other grades is $60 per month times the grade level. 

Salesforce

Explain Salesforce in a Layman’s term. Why do we need it ? Briefly summarize the services provided by Salesforce.How is Salesforce different than traditional CRM solution 

Computer science

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.