Numerical computation Project

 Project Description  

 –  Learn one state of the art multivariate analysis method 

        • NMF, PCA, ICA, NN, CNN, etc. 

 –  Apply matrix analysis and numerical computation on real world data sets 

        • image, video, audio, social media, sensory signals, etc. 

Project Topics 

 – Given topics 

    • Numerical computing in econometrics             • Applications of the SVD 

    • Multi-level non-negative matrix factorization    • Multi-view non-negative matrix factorization                   

    • Advanced principal component analysis          • Binary independent component analysis 

     • 1D convolutional neural networks                    • Survey of automatic rank determination in non-                   negative matrix factorization 

– Free optional topics 

  • You can also search and select a topic other than above given topics as your final project. But your topic should be related to matrix, multivariate analysis and numerical computation. Please send me your topic for approval in advance if you choose a free optional topic. 

Project Deliveries 

   – Project proposal (template will be given) 

         • Topic, method, application, novelty 

         • Novelty (new investigation, new trials, new idea, new design, technology improvement) 

 – Presentation (10m presentation) 

– Project report 

        •Experiment and discussions 

        • Findings and conclusions 

        • In paper format (template will be given) 

         • Good quality project reports will be refined and polished by Dr. Sun and submitted for publication • https://cscsu-conference.github.io/ 

PS.  Paper types file is the guide line for this project.

        Proposal template have to be used for the project proposal. 

        Lab report template has to be used for the lab report. 

        There are explanations for .zip files in the Paper types file.

Ps. LATEX compiler and Editor Link

       MiKTex  ::  https://miktex.org/download 

       Texmaker :: https://www.xm1math.net/texmaker/download.html

Computer Forensics

 Assignment: Denial of Service ToolsLearning Objectives and OutcomesDifferentiate between tools that are used to create a denial of service (DoS) attack.Assignment Requirements
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:

  • Tribe Flood Network
  • TFN2K
  • Trin00

For this assignment:

  1. Search the Internet for information about these three tools.
  2. Provide a description of each of the three tools.
  3. Describe the damage or impact of denial of service attacks.
  4. Summarize the efforts used and solutions found to combat these attacks.

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
  • I described each of the three tools.
  • I described the damage or impact of denial of service attacks.
  • I summarized the efforts and solutions found to combat these attacks.

Module 2 – SLP, SYSTEM DESIGN AND PROJECT PLANNING

 

This assignment consists of two parts:

Part 1: SLP Assignment Overview

When the requirements and design are completed for a project, the coding can begin. A good first step in development is to use the design to create a prototype, or proof of concept for the system. The prototype helps ensure the validity of the design and demonstrates that the basic concepts in the design will provide the desired solution. For this SLP assignment you will use your Design Document from the Case Study to guide the creation of a prototype for your integrated system.

Part 1 SLP Assignment Expectations

The Prototype should address the following requirements:

  • The prototype should match the overall design created in the Case Study assignment and should provide evidence that the intended design will work.
  • A basic visual interface to support navigation of the program and identify the future functionality of the application.
  • No subsystem functionality is required but stubs to connectivity points for subsystems should be identified and have the ability to perform basic functionality tests.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docxthat describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application).
    • This document should also provide a summary of how the prototype shows proof-of-concept for the project.
    • Include a section called STATUS with a summary of the current status of your project including problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Part 2: SLP Assignment Overview

For this SLP assignment you will submit the Alpha version of your project. An alpha version of an application will have the major functionality operational but not fully completed. The purpose of the Alpha version is to ensure the major functional components of the application will work as intended. Your alpha version should have connections established to all outside components and internally developed functionality should be operational at a least a fundamental level.

Part 2 SLP Assignment Expectations

The Alpha version should address the following requirements:

  • The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
  • All major functionality should be operational at least at a minimal level.
  • Connections to outside components should be functioning at a basic level to prove they will work for the final version of the application.
  • The visual interface should provide access to all major functions of the application.
  • There should be a demonstrable, functional connection to the required database for the project.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docx that describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
    • Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment

Internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

User Interface Design Document.

  

Assignment:

create a User Interface Design Document for this desktop part of the vehicle of interest application. 

The project background and requirements information are attached. Take the template User Interface Design Template and complete it for your design. 

You are to use Pencil GUI Designer for screen mockups.

This design must conform to good design standards.

Discussion question, 350 words and 2 references.

A.     What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your discussion with at least two (2) external sources.

B.     Present a discussion of the strategies for encouraging participative management in the workforce, and how to implement each of these strategies. Support your discussion with at least two (2) external sources.

C.    What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Support your discussion with at least two (2) external sources.

Practical Connection

 

This is the Practical Connection Assignment for this course. The purpose of this assignment is to help connect the concepts learned in this course to real-world situations that you may face as an IT professional.

For this assignment, you will write an essay addressing the applications and implications of a law or regulation discussed in this course to the conduct of your duties as an Information Technology professional. Your essay should address the following.

  • a definition and overview your selected law or regulation
  • consideration of the duties of an Information Technology professional
  • an analysis of the application of that law or regulation in the context of the identified duties
  • a reference page(s)

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. This is not a formal paper, but should maintain scholarly tone and rigor, and you MUST cite your references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will be addressed as discussed in the plagiarism section of the syllabus. 

Here are a few details about the overall research paper.

  • Your paper does not require a Title page.
  • Your paper must include a Reference page.
  • Your paper should NOT include an abstract.
  • Your paper must include a minimum of 4 peer-reviewed resources (articles or papers)
    • Cited sources must directly support your paper (i.e. not incidental references)
  • Your paper must be at least 500 words in length 
    • Reference pages are NOT included in calculating the paper length. (Neither are Title pages or abstracts if present).

If you are not sure how to identify peer-reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title. 

Include at least one quote from each of 3 different articles.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).