Presentation. Computer Science 302

Presentation on ITUnand its purpose

ITU-T (International Telecommunications Union – Telecom Group 

Technical recommendations about telephone, telegraph and data communications interfaces 

Composed of representatives from each country in UN

Based in Geneva, Switzerland (www.itu.int)

Additional Source

https://whatis.techtarget.com/definition/International-Telecommunication-Union-ITU

https://www.itu.int/en/ITU-T/Workshops-and-Seminars/qos/022015/Documents/Bios-Abstracts-Presentations/S1P1-Hiroshi-OTA.pptx

CS

Q1  Network Access Control. (600 – 800 WORDS)

     1 a.  Explain how it is relevant to network security.  Be as clear as you can in explaining your topic by using examples, software, hardware, etc. ( 200 words).

short answer

 

  • JavaScript has numerous ways of maintaining session state information, including query strings, hidden form fields, and cookies. Discuss the method you believe to be the most secure. Include in your response an example of how these methods can be exploited.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

1 Case Study

Case Study 3.1

Read “Can We Trust Big Data?” (see attached file)
Answer the questions

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Writing Requirements

  • 3–5 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Discussion 3.1

If the following data were stored as rasters, which ones would be discrete and which would be continuous: rainfall, soil type, voting districts, temperature, slope, and vegetation type?

Discussion 3.2

List the main advantages of using topology-based data sets in GIS.

Computer Science 302 Presentation bUSINESS DATA AND COMMUNICATION

 Instructions

Explain and provide example when it is possible that will cover chapter 5 subjects:

•Transport Layer Protocols•Network Layer Protocols

•Transport Layer Functions

–Linking to the application layer

–Segmenting

–Session Management

•Network Layer Functions

–Addressing

–Routing

•TCP/IP Examples

Pick Two Protocols from the following, and Discuss, Present them on the class:

  • IPX/SPX Protocol
  • X.25 Protocol
  • SNA (System Network Architecture) Protocol
  • SNMP [Simple Network Management Protocol]
  • Resource Reservation Protocol (RSVP) Protocol
  • Cisco Internetwork Operating Systems (IOS)

https://root-servers.org/
ICANN (Internet Corporation for Assigned Names and Numbers): https://www.icann.org/
The American Registry for Internet Numbers : www.arin.net

E-Business Strategy – Paper discussing attached Amazon Article Paper and Memo to the CEO Amazon

Subhject: E-Business Strategy

Instruction:

* Read the attached Amazon Article. 

* Discuss the eight unique features Ubiquity,Global Reach,Universal Standards,Richness,Information Density,Interactivity,Personalization/Customization,Social Technology in relvant to article.

* Discuss Amazon’s dominance and disruption mentioned in the article. 

* Also, analyze the e-Business strategies discussed in the article and the impact these strategies have on the marketplace

Important DELIVERABLES: Two items:

————————————————–

*** Item # 1. A 4-5 paper with 4 minimum references.

*** Item # 2. A short memo to the CEO of Amazon stating your opinion of Amazon’s e-Business strategies.

AI with reinforcement Learning

 Your task, put simply, is to design a reinforcement learning algorithm to teach the mouse how to find the food. The fundamental task is as follows: • There is a 100×100 matrix representing a grid where any space can either be occupied by a mouse or a piece of food. There is only one mouse, and an arbitrary amount of food. • The mouse is able to sense the food with a 3×3 matrix representing its sense of smell, the range of which is the full grid, and stacks (Two foods next to each other will generate twice as much smell). This will be the input for your algorithm. Note that the center of this matrix will always be 0, as that space represents the mouse itself. • The mouse has a limited amount of energy, which is fully replenished when it finds food. If it runs out of energy, it dies, and the game is over. • The mouse is able to move in any cardinal direction (North, South, East, and West). The goal is for them to eat all of the food in the grid as quickly as possible. This simulation is visually represented using PyGame. This task can also be solved by a trivial algorithm using nothing but simple arithmetic, as the ‘scent’ of food is a function of distance from the mouse. You can try to find a non RL solution and compare it to the best version of the RL algorithm’s results. For each frame, a forward pass is run through your model. The input for each frame is an array (or tuple) with four numbers between 0 and 1. These are the probabilities generated from your model. These will determine how the mouse moves. QUESTIONS:  (The questions are not graded by correct/incorrect. They are just here to get the student thinking.)  Q: Does the order matter for the reinforcement learning model? (Ex: Inputting (N,S,E,W) vs (N,E,S,W))   Q: Does the order matter for a closed form solution?  Q: What would be better for reinforcement learning; taking the highest value from the array as the movement choice, or choosing a random direction weighted by the given probabilities? Why? Tasks for the students • Write a reward function.  You have access to the current game state, as well as the number of previous frames (Ex: 50) of input matrices, food level, and number of food tiles found. This number of frames will be the same number of frames it takes to starve from a full energy level.  This can be very simple, like just using the number of food tiles found, or use reward shaping using multiple frames of previous input matrices to create more frequent positive/negative rewards (Ex: when the mouse moves closer or farther away from food.)  QUESTIONS:  Q: What would be a sparse reward function for this model?   Q: How can the reward function be improved?  • Write a model:  As described above, write a model that takes in 8 inputs (The mouse’s sensory matrix minus the center), and outputs four probabilities for each cardinal direction.  In addition, you will be handling when to back-propagate a reward, or when to keep running. Additional task (Optional worth extra credit):  There are many variables that you can mess around with to complicate the problem to make it more suitable to Reinforcement learning. One of them is decreasing the range of the mouse’s scent with the variable SCENT_RANGE. Another is the variable VARIABLE_TERRAIN which gives the mouse a second sense (sight) and adds a value to each terrain section which indicates how much energy is spend by stepping over that tile.  Q: How does the reward function change if you add the new variables?  

Research Paper

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

  • Prompt 1 Blockchain (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 
  • Prompt 2 Big Data (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.
  • Prompt 3 Government and Policies (2-3 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place.

Conclude your paper with a detailed conclusion section (1-2 pages long).

Your paper should meet the following requirements:

  • Be approximately eight to twelve pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Data Systems

Throughout the chapter, you have reviewed various examples of B2B and B2C stores where 1-1, 1-M, and M-M relationships are portrayed. Can you provide example use cases where a business would need data to be fairly rigid, applying a 1-1 model? How about fairly lenient, applying a M-M model?

Instructions:

  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.