Assignment 5

 

You shall write a C++ program that:

  1. Reads an arbitrary number of whitespace-delimited tokens from standard input.
  2. Determines and prints (to standard output) two decimal integer values:
    1. The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in /srv/datasets/scrabble-hybrid.
    2. The total number of points that all those words would be worth in Scrabble, according to the letter values in /srv/datasets/scrabble-letter-values.

Specific Requirements

  1. You may assume that the number of valid words and the total number of points will not exceed the range of an unsigned 64-bit integer.
  2. Open and read the contents of each relevant data file exactly once.
  3. Make sure to use STL components that will avoid any gross inefficiencies (excessive computation and/or storage) in your program. Your program should at least be able to process each of the example inputs below in no more than 5 seconds, on our server.
  4. Print the two integer values in the order specified above, and make sure your output contains no other numeric decimal values. Otherwise, the format of output is up to you.

Sample Executable and Expected Output

A sample executable named cs19_scrabble_total is available on the server, which demonstrates expected behavior of your program, e.g.:

$ cs19_scrabble_total <<< 'spinnaker'
1 word worth 15 points

$ cs19_scrabble_total < /srv/datasets/many-english-words.txt
519135 words worth 7566688 points

$ cs19_scrabble_total < /srv/datasets/shakespeare-othello.txt
17531 words worth 105915 points

$ cs19_scrabble_total < /srv/datasets/king-james.txt
650865 words worth 4305807 points

Lab 15 HTML

 

  • Review the Multimedia PDF and the Web Development PPT
  • Download the Word document below and follow the instructions
  • HTML Lab
  • ZIP up your HTML file and your image file into a Lab15.zip file
  • Upload the ZIP file to Canvas for grading

Cyber security planning and management

It is important to understand that humans and technology interact in all information systems. Why do you feel businesses must spend time and money to educate their employees on security matters? 

300 Words

Data Science

 Classification: Basic Concepts

Decision Tree Induction

Bayes Classification Methods

Rule-Based Classification   

Assignment 4

1- Consider the data in the following table: 

  

TID 

Home Owner

Marital Status

Annual Income

Defaulted   Borrower

 

1

Yes

Single

[120 – < 150K]

No

 

2

No

Married

[90 – < 120K]

No

 

3

No

Single

[60 – < 90K]

No

 

4

Yes

Married

[120 – < 150K]

No

 

5

No

Divorced

[90 – < 120K]

Yes

 

6

No

Married

[60 – < 90K]

No

 

7

Yes

Divorced

[120 – < 150K]

No

 

8

No

Single

[90 – < 120K]

Yes

 

9

No

Married

[60 – < 90K]

No

 

10

No

Single

[90 – < 120K]

Yes

Let Defaulted Borrower be the class label attribute. 

a) Given a data tuple X = (Home Owner= No, Marital Status= Married, Income= $120K). What would a naive Bayesian classification of the Defaulted Borrower for the tuple be?

2- Consider the training example in the following table for a binary classification problem.

  

Customer ID

Gender

Car Type

Shirt Size

Class

 

1

M

Family

S

C0

 

2

M

Sports

M

C0

 

3

M

Sports

M

C0

 

4

M

Sports

L

C0

 

5

M

Sports

XL

C0

 

6

M

Sports

XL

C0

 

7

F

Sports

S

C0

 

8

F

Sports

S

C0

 

9

F

Sports

M

C0

 

10

F

Luxury

L

C0

 

11

M

Family

L

C1

 

12

M

Family

XL

C1

 

13

M

Family

M

C1

 

14

M

Luxury

XL

C1

 

15

F

Luxury

S

C1

 

16

F

Luxury

S

C1

 

17

F

Luxury

M

C1

 

18

F

Luxury

M

C1

 

19

F

Luxury

M

C1

 

20

F

Luxury

L

C1

a) Find the gain for Gender, Car Type, and Shirt Size.

b) Which attribute will be selected as the splitting attribute? 

R5RS Scheme (Dr.Racket)

;; Towards a Scheme Interpreter for the Lambda Calculus — Part 1: Syntax

;; 5 points

;; , and pre-requisite for all subsequent parts of the project

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; All programming is to be carried out using the pure functional sublanguage of R5RS Scheme.

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; You might want to have a look at http://www.cs.unc.edu/~stotts/723/Lambda/overview.html

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; 1. The lambda calculus is a particularly simple programming language consisting only of

;; variable references, lambda expressions with a single formal parameter, and function

;; applications.  A BNF definition of lambda calculus expressions is

;; ::= | (lambda ( ) )  |  ( )

;; Design a data type for the lambda calculus, with constructors, selectors, and classifiers.

;; For concrete representation, use Scheme, as follows:  an identifier should be represented as

;; a quoted Scheme variable, a lambda expression (lambda (x) E) as the quoted 3-element list

;; ‘(lambda (x) [list representing E]), and an application  (E1 E2) as the quoted 2-element list

;; ‘([list representing E1]  [list representing E2])

;; 2.  In (lambda () ), we say that is a binder that

;; binds all occurrences of that variable in the body, , unless some intervening

;; binder of the same variable occurs. Thus in (lambda (x) (x (lambda (x) x))),

;; the first occurrence of x binds the second occurrence of x, but not

;; the fourth.  The third occurrence of x binds the fourth occurrence of x.

;; A variable x occurs free in an expression E if there is some occurrence of x which is not

;; bound by any binder of x in E.  A variable x occurs bound in an expression E if it is

;; not free in E.  Thus x occurs free in (lambda (y) x), bound in (lambda (x) x), and both

;; free and bound in (lambda (y) (x (lambda (x) x))).

;; As a consequence of this definition, we can say that a variable x occurs free in a

;; lambda calculus expression E iff one of the following holds:

;;   (i) E = x

;;   (ii) E = (lambda (y) E’), where x is distinct from y and x occurs free in E’

;;   (iii) E = (E’ E”) and x occurs free in E’ or x occurs free in E”

;; Observe that this is an inductive definition, exploiting the structure of lambda calculus

;; expressions.

;; Similarly, a variable x occurs bound in a lambda calculus expression E iff one of the

;; following holds:

;;   (i) E = (lambda (x) E’) and x occurs free in E’

;;   (ii) E = (lambda (y) E’), and x occurs bound in E’: here, y may be x, or distinct from x

;;   (iii) E = (E1 E2) and x occurs bound in either E1 or E2

;; Develop and prove correct a procedure free-vars that inputs a list representing a lambda calculus

;; expression E and outputs a list without repetitions (that is, a set) of the variables occurring

;; free in E.

;; Develop and prove correct a procedure bound-vars that inputs a list representing a lambda calculus

;; expression E and outputs the set of variables which occur bound in E.

;; 3.  Define a function all-ids which returns the set of all symbols — free or bound variables,

;; as well as the lambda identifiers for which there are no bound occurrences — which occur in

;; a lambda calculus expression E.  

Digital Forensics Tools&Tech

 

Week Eight Assignment

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

BI_Assignment_3

Discussion: 
1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.
2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
4. What are the most common metrics that make for analytics-ready data?

Exercise:

12: Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education,
climate to public safety. Pick a topic that you are most passionate about. Go through the topic- specific information and explanation provided on the site.
Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
 

Be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
 

Intro to Data mining

 

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

 Please ensure to cite the Author, YYYY with any content brought into the discussion.   All discussions should contain at least one reference (and matching in-text citation in APA format).