Python Data Analytics Project

THE PROCESS

1. SELECT a domain area of research (COVID-19 related) *Please chat with me for pre-approval

2.  FORMULATE a problem statement & hypothesis. describe the problem in details you wish to explore.

3. FRAME the question(s) according to your domain

a. Understand A Business

b. Understand A Stakeholders

4. OBTAIN data for your project 

a. Describe the Data: Information about the dataset itself, e.g., the attributes and attribute types, the number of instances, your target variable. 

5. SCRUB the data, this includes cleaning and preparing the data for analytic purposes

6. ANALYZE the data, looking for patterns and insights (EDA & Analytics) *Use Jupyter Notebook

7. SUMMARIZE your findings

Discrete structures

 

Chapter 1

1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)

1.3 (1, 2, 3, 13, 14)

Chapter 2

2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)

2.2 (1, 2, 3, 4, 5, 6, 9, 10)

2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)

 

Chapter 4

4.1 (1,2,3,4,5,6,7,8,9,10,15,16,18,24)

4.2 (1,2,4,12)

4.3 (1,2,3,4,5,6,9,10,11,15)

4.4 (1,2,3,4,5,6,12,13)

4.5 (1,2,3,4,7,8,11)

Chapter 5

5.1 (1,2,3,4,5,6,7,8,10,11,12,18,29,33,34,37,40,43,59,62,71,72)

5.2 (1,2,6,20,21,22,23,26,27)

5.3 (3,4,5)

5.4 (1,2)

5.5 (1,2,3,4)

5.6 (1,2,3,4,22)

 

Chapter 6

6.1 (1ab, 14, 17, 34)

6.2 (1)

6.3 (1)

Chapter 7

7.1 (1, 17, 18)

7.2 (9, 15)

Chapter 8

8.1 (7, 11, 13, 14)

8.2 (1, 2)

8.3 (2, 5)

8.4 (1)

security

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

RS

or this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.
• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.Requirements:The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Week 6 Discussion

 Create one discussion thread and answer the following questions:

(Chapter 10/13): With the advent of ML/AI, what effect do you think this will have on the future of firewalls? What kinds of new implementation techniques do you think will emerge because of ML/AI?

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Research topic

 Topic- Journal of Systems and Software 

This is a continuing assignment; you will be using this drop box until you and your faculty mentor approve your topic. 

In a 200-word document, describe your topic. Identify research in the area any models/theories developed in the area. Have you identified a cite problem/gap in this body of knowledge?

Are you considering doing a qualitative, quantitative, mixed method, project, etc., study, identify a possibly population to gather data from.

If you are a CPT student, please include the following as well:
Have you been issued CPT or are currently on CPT? If so what is your CPT code?

If you have a CPT code then:
Post your job description.Upload an official job description on company letterhead. Please copy/paste your current job responsibilities identify how your proposed topic in your discipline relates to the program goals and core courses. 

  • Once your mentor has approved your topic, you will use the below form to add all the components and submit to the school.

federated architecture in cloud systems

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class.

Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.