ITS-836 – Data Science & Big Data Analytics – Literature Review & Discussion

Subject: ITS-836 – Data Science & Big Data Analytics

Reading Resources: 

Dash, Shakyawar, S. K., Sharma, M., & Kaushik, S. (2019). Big data in healthcare: management, analysis and future prospects. Journal of Big Data, 6(1), 1–25.

Nastaran Hajiheydari, Mohammad Soltani Delgosha, Yichuan Wang, & Hossein Olya. (2021). Exploring the paths to big data analytics implementation success in banking and financial service: an integrated approach. Industrial Management + Data Systems, 121(12), 2498–2529.

Dai, Wang, H., Xu, G., Wan, J., & Imran, M. (2019). Big Data Analytics for Manufacturing Internet of Things: Opportunities, Challenges and Enabling Technologies.

Ge, M., Bangui, H., & Buhnova, B. (2018). Big data for internet of things: a survey. Future generation computer systems, 87, 601-614.

ASSIGNMENT 1: Literature Review: Big Data in Smart Cities Literature Review

Conduct a literature review of big data handling approaches in smart cities including techniques, algorithms, and architectures. You are to review the literature on smart cities and Big Data Analytics and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.

Paper Layout:

– Title Page

– Table of contents: Use a Microsoft Enabled Table of Contents feature.

– Background: Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue. Be sure to include techniques, algorithms, and architectures.

– Research Questions: In the identified problem area that you are discussing, what were the research questions that were asked? Be sure to include main research questions from all the literature you are reviewing.

– Methodology: What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. You will discuss the methodology for all the literature you are reviewing.

– Data Analysis: What were some of the findings, for example, if there were any hypotheses asked, were they supported?

– Conclusions: What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported? Be sure to also include the similarities and differences between the literature.

Paper requirements:

– Be a minimum of 7 pages in length, not including the required cover page and reference pages.

– Follow APA 7 guidelines. Be sure to conduct research on formatting literature reviews.

– Your literature review should include a minimum of 8 scholarly peer-reviewed journal articles.

– Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

ASSIGNMENT 2: Discussion:

There are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

1. Data Gathering

2. Storage and Integration

3. Data Analysis

4. Knowledge Discovery and Information Interpretation

– Please cite properly in APA 7· 

– At least one scholarly source should be used. · 

– Use proper citations and references in your post.

– Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.  

This post consists of 2 individual assignments. Please provide answers in separate documents. Also, attach plagiarism reports.

Note: plagiarism check required, APA7 format, include References, within 8hrs

Evaluating Large Datasets1

 

Complete the following:

For each of the following actions, use each language to complete a programming solution.

Please copy the numbered action into your Microsoft Word document.

Please post your code for Python to cover item 1 below.

For items 2–3 below, provide a screenshot of the execution, in Java and R, showing the code and the result set. Be sure to submit the actual .py file for Python in this module. Make sure to also respond to items 4 and 5.

Start a next action on a new page.

For items 1–3, use the IN300_Dataset1.csv file.

1. Write a Python program that reads the CSV file into a Panda dataframe. Using that dataframe, print the row, source IP, and destination IP as a table.

2. Write a Java program that reads the CSV file into an ArrayList. Convert the ArrayList to a string array and print the row, source IP, and destination IP on the same line using a loop.

3. Write an R program that reads the CVS file using the read.csv data type. Print the row, source IP and destination IP of each line.

As part of the mastery requirements for this Competency Assessment, complete the following boldfaced item:

Using the requirements for Step 3 above, write code, in R, that adds the protocol to the output of the given assignments.

4. Compare and contrast the data collection used for each language.

5. Discuss the data science process.

You have just been hired as the corporate security manager

  

You have just been hired as the corporate security manager for a major e-commerce corporation. Your boss has told you that the CFO and CEO made legislative compliance a top priority. Because your e-commerce site accepts credit cards, the company handles confidential customer information. You are told that no program or policies currently exist, and your top level management has only recently seen the need for a policy. Formulate a plan to bring the organization into compliance as quickly as possible. Develop short-term goals over the next 6 months and long-term goals that may take up to 5 years. Consider how you may approach this new assignment and discuss your short and long term approach with respect to building this program.

length 2-3 pages

Transport Encryption

 

Describe why web browsers mostly use Hypertext Transfer Protocol Secure (HTTPS) rather than Hypertext Transfer Protocol (HTTP) while e-commerce transactions are being made.

Assignment Directions: Briefly and concisely discuss the assigned topic in a word document of approximately 10 sentences.   

business enterprise

 

 Your consulting company has been hired to design and implement a network for a small to mid-sized vertically integrated sales and manufacturing company with about 75 employees and 40 PC’s.  They have provided you with the following requirements:  

• Central Domain Structure including the design of the OUs for management of workstations and users should be developed based on the Company organizational chart provided. • Group Policies configured to support the following • Encrypted files on clients with appropriate recovery setup • Setup File Shares with appropriate permissions based on the AD structure you configured.   o Departments should each have a shared location accessible only to that department’s users to store files. • Configure a central update server with appropriate groups and enableconfigure client side targeting • Configure Roaming Profiles for the users along with folder redirection for key folders to help with login times, ensure the security settings are correct on these folders so as to prevent other users from being able to access a profile that is not theirs. o Redirected folders should include Documents, Desktop, and Favorites • Setup DNS in your environment as needed. • Develop a plan for future DHCP Configuration, it is not necessary to implement this. • Setup and configure a print server to share printers with appropriate permissions o The CEO doesn’t like to wait behind others when he prints and expects you to provide a solution o There needs to be a way to control who can print to the color printer. • You should also include a recommended backup and recovery plan but you do not have to implement this. • They would like a secure solution for Remote Access to allow employees to access applications from either a personal device or when traveling with a work device. 

For your final deliverables of this project you will submit complete documentation of your proof of concept environment and the plans detailed in the requirements document.  This documentation should be complete technical documentation with enough detail to allow the reader to reproduce your solution and understand why you made the configuration selections you did.   There are some articles and tips linked in the Course Resources section on how to write successful documentation.

For your presentation you will provide a business targeted video presentation of how you addressed their requirements.   This presentation should include some sort of visual aidshandouts and should not be overly technical in nature.   Your presentation should be between 5 to 10 minutes long and you need to make sure to include any background information or assumptions that you needed even if the items do not directly correlate to a requirement.

H2LoginPage

This assignment requires students to follow the slides of H2LoginPage.pdf and complete the tasks below:Follow the steps as illustrated in H2LoginPage.pdf to create a Login Page, with the solution name “LoginPage” being prefixed by the initials of your given and family names. For example, the solution name needs to be jsLoginPage if the student’s name is ***** *****.

Modify the function okButton_Click() and write C# ***** to allow the modified function to check if a password ***** ***** A valid password ***** have at least six characters with both letters and numbers. In addition, the password ***** start with a letter, and cannot contain characters other than letters and numbers.

While the “Cancel” button still terminates the application, the “OK” button produces the following different messages according to user input:

“Please fill in all slots.” if one or both of the slots are empty;

“Thank you for providing the input.” if the password ***** the requirements;

“A valid password ***** to have at least six characters with both letters and numbers.” in all other cases.

Package the folder containing all files of your solution and submit it online before due.

Hints: please check ASCII table for the code range of letters and numbers, and refer to http://msdn.microsoft.com/en-u… C# ***** codes using string.chars properties.

Discussion

his is a required assignment worth 50 points (50-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts. Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 1 & 2  (Jamsa, 2013).Chapter 1 topics:

  • Define and discuss cloud computing.
  • Discuss how cloud computing has changed how companies budget for software solutions.
  • Compare and contrast SaaS, PaaS, and IaaS, and provide an example of each.
  • Define scalability and discuss how the cloud impacts it.
  • List three advantages and three disadvantages of cloud computing.
  • Define virtualization and discuss how the cloud impacts it.
  • Describe three cloud-based solutions for individuals and three cloud-based solutions for businesses.
  • Discuss how Web 2.0 has driven the growth of the web.
  • Compare and contrast public, private, community, and hybrid clouds.

Chapter 2 topics:

  • Define and describe PaaS
  • List the benefits of PaaS
  • Describe the potential disadvantages of PaaS
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with PaaS.
  • Assume your company must deploy a .NET solution to the cloud.  Discuss the options available to developers.  Research on the web and estimate the costs associated with deploying a PaaS solution.
  • Assume your company must deploy a PHP or Java solution to the cloud.  Discuss the options available to developers.  Research on the web and estimate the costs associated with deploying a PaaS solution.