term paper

Write a 3-4 page APA formatted paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how you plan to get the data. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, in sufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures.

Your paper should include an abstract and a conclusion and a reference page with 3-5 references.

Please can you generate a topic on this within 24 hours because it needs to be approved by the lecturer

 In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  
Carefully, choose your domain. Give a rationale for simulating it.
Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
Think about seeding trends and patterns in your simulated data that you can “detect” later.
Use dplyr to extract the columns you need from the dataframes.
Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.
 Part 1: Analysis of the Data (70 marks)
You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.
Simulation of data (20 marks)
Transforming data (10 marks)
Analysis of data and plots (20 marks)
Write-up of the data analysis (similar format of my R tutorials) (20 marks)
Part 2: Scale-up Report (30 marks)
The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?
Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)
Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

week 12 Discussion – Cyberlaw

Please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 450 words. Please add references in APA format.

IT Project Management 2 page paper

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies). Write a paper describing the project in terms of its scope, time, and cost goals. Also describe other impacts on a project, such as quality resources and risks. Discuss what went right and wrong on the project and the role of the project manager and sponsor. Also describe whether the project was a success and why. Include at least one reference and cite it on the last page. 

APA style, 2 pages, Cover Page, Microsoft Word format.

Security Portfolio Assignment(Min 600 words)

Question for Week7:

 

In week #4, your midterm project was to provide a security assessment for Vestige, Inc, an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide Vestige, Inc. with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

1. Cover Page (i.e. APA title page)

2. Background (provide a synopsis your midterm security assessment on Vestige)

3. For each security need identified (or needs to be identified) from your Week #4’s Midterm Assignment, Find the products that will deliver the needed capabilities for the right price, and tell why you chose that product.

This assignment should be about the security needs only.  Do NOT discuss how the client can achieve more business (That is not your job). Please use  APA format and include at least two references.

Other references:

Below is the question for week4 assignment

 

Vestige, Inc. is an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for your first time.  Since you have spent the past several weeks in training to be a System Architect, perform your assessment:

Hint: Review your assignments from week 1-3

This assignment should be in APA format and have to include at least two references.

Week4 Assignment Attached:

cloud_computing

 Compare between different formal Cloud definition? Based on stale and standards? (include the NIST definitions)

Hint: SP 800-145 September 2011  The NIST Definition of Cloud Computing

write briefly on Cloud Computing Recommendations suggested by NIST .

Hint:  SP 800-146 May 2012  Cloud Computing Synopsis and Recommendations

What are the Key Security and Privacy Issues?

Hints:  SP 800-144 December 2011  Guidelines on Security and Privacy in Public Cloud Computing

 Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements:

  • 2 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Computer science and algorithms

Question 1: Let G = (V,E) be an undirected graph and s and t be the source and target nodes. Give an efficient algorithm to determine whether the number of minimum s − t cuts in G is at most two. Analyse your algorithm and provide its complexity.

Question 2: Suppose that X is a 2×1 matrix and Y is a 1×2 matrix. Prove that XY is not invertible.

Question 3: Let G = (V,E) be an undirected bipartite graph with parts AandB(V =A∪B,A∩B=∅)andthereisnoedgewithbothendpointsin A or both endpoints in B). Also, let X and Y be two sets of vertices such that X ⊆ A and Y ⊆ B. Suppose that G has two matchings M1 and M2 such that M1 covers all vertices in X and M2 covers all vertices in Y . Prove that G has a matching M such that M covers all vertices in X and Y . (A matching covers a vertex if one of the edges of the matching has that vertex as an endpoint.)

Question 4: Provide a linear program for the following problem:

A factory produces Aluminium plates of a standard width 3meters. But cus- tomers want to buy plates of shorter widths. So, the factory has to cut original 3m plates. One 3m plate can be cut, for instance, into two plates of 93cm width, one plate of width 108cm, and a rest of 6cm (which goes to waste). Suppose that we have the following orders:

• 97 plates of width 135cm • 610 plates of width 108cm

• 395 plates of width 94cm

• 211 plates of width 43cm.

What is the smallest number of 3m plates that have to be cut in order to satisfy this order? how should they be cut? (Hint: there are 12 different ways of cutting a plate into useful subpieces; you’ll need to figure them all out.)