RM-RESEARCH-8

RESEARCH:

Need this research paper by Saturday USA time. (5 days from now).

5 pages excluding references and cover page. Follow APA 7 format and citations.

TOPIC: 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately five to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Building an AI machine/Deep learning application

 

  1. Part 1 –
    1. Following is the link of the Project and Dataset :

Quick Guide to Build a Recommendation Engine in Python & R

MovieLens 100K Dataset

  1. Run the code several times and show the intended output…you also need to EXPLAIN the output…
  2. You will also need to provide output for the following:
    1. Python file containing your code…
    2. Dimensions of the data…
    3. Sample of the data…
    4. Statistical summary of the data…
    5. Class distribution…
    6. One univariate and one multivariate diagram…
    7. Decision Tree…explain the best depth and why?…
    8. Results of training and new data, 80%-20% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
    9. Results of training and new data, 50%-50% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
  3. Part 2 – Updated Code…
    1. Now that you have a working base of code, let’s apply it to a “real world” scenario…
    2. Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…
    3. Update the original application so that it “works” for the NEW application…
    4. In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…
    5. YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.
    6. Run the code several times and show the intended output…you also need to EXPLAIN the output…
    7. You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:
      1. Python file containing your code…
      2. Dimensions of the data…
      3. Sample of the data…
      4. Statistical summary of the data…
      5. Class distribution…
      6. One univariate and one multivariate diagram…
      7. Decision Tree…explain the best depth and why?…
      8. Results of training and new data, 80%-20% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…
      9. Results of training and new data, 50%-50% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…

Organ decision

Discussion:  Read this article and Provide 2 examples of what to say and 2 examples of what not to say. Think like a leader is the objective of this discussion.

Be creative on how you deliver your response (i.e. new letter, flyer, other innovative tools)

Assignment:  Read the IT Investment at North American Financial Case Study on pages 165-168 in the textbook. Answer Discussion Question# 2 A comprehensive and holistic governance of IT spending and benefits delivery at all levels. 

IT345 8

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources. 

 

Topics:

  • Do you believe we are too dependent on computers? Why or why not?
  • In what ways are we safer due to new technologies?
  • What are some recent examples of technology that has been created that is used to “save lives”?

PowerPoint presentation

 

Using the information from the URLs provided create a Power Point Presentation of the Technical Report you are writing.

File name:  LastName_First Name_PPP.pptx

General guidelines for Power Point Presentation

Do not copy sentences and/or a paragraph from your report and insert it into a slide.

Each slide should have a limited number of lines of text and these should be a main point or points from the report.  The size of the text should be readable from the back of a large classroom

You can use images on a slide.  The image should be viewable from the back of a large classroom

You can use the same template or background on every slide

Do not have a white background on any slide

Use a simple transition from one slide to the next

Limit the number of (or use no) transitions to display successive lines on a slide

 

BI_Assignment_1

 Complete the following assignment in one MS word document:  

Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15) 

Policy and legal_Project

Abstract for the project

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.

Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions

Business Intelligence and Analytics (Exercise)

  

Watson and its success on Jeopardy! cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report