Simple random Sampling Discussion

What’s simple random sampling? Is it possible to sample data instances using a distribution different from the uniform distribution? If so, give an example of a probability distribution of the data instances that is different from uniform (i.e., equal probability).

All discussions should contain at least one reference (and matching in-text citation in APA format).

A suitable system to implement. This system must be a data processing system that concerns the creation, storage, management, processing and visualising of a set of data with which you are currently involved.

   

Specification

Introduction

A suitable system to implement. This system must be a data processing system that concerns the creation, storage, management, processing and visualising of a set of data with which you are currently involved. 

This implementation MUST be undertaken using the Python 3 programming language (as per the work you have done in your learning sessions).

Part 1 System Build

Provide a concise written description of your selected data processing system (guideline word count 500 words). This can include diagrams or images if this is required to best support your description. Also, include the user stories that describe the functionality of the system. Whilst this will not directly accrue any marks, it is required to establish if your software implementation satisfies the requirements of the system.

Produce a Python 3 implementation of your chosen system. This must provide the data processing and visualisation relevant to your system and provide a graphical user interface (GUI) to this processing and visualisation.

You must utilise object-oriented programming where appropriate and structure your solution using the module and package approach adopted by good idiomatic Python 3 implementations (also referred to as being Pythonic). It is expected that the structure of your submitted Python project will also reflect this

   

structure, utilising a main project folder (with any necessary sub-folders) and appropriate Python 3 script files.

You are also expected to provide full documentation of the details of your implementation by including appropriate code comments within your Python 3 script files.

Part 2 Automated Testing

Provide a set of automated unit tests (using a suitable Python 3 automated testing  framework  such  as  the  unittest module)  that  exercise  and demonstrate the correct functionality for 4 separate methods taken from a class (or classes) that is involved with part of the data processing in your system. You can choose methods related to any of the CRUD functions. Do not include any method which would require testing of the GUI (this is beyond what was included as part of your learning during the module). Ensure you fully document your test code using appropriate code commenting.

Your automated unit tests must be provided within the Python project in a way that properly separates these tests from the production version of your implementation. Also, the automated unit tests must be able to be run from within the PyCharm Community Edition IDE you have worked with in your learning sessions, using the automated unit testing integration offered by this IDE.

Part 3 System Function Traceability Report

Produce a report that traces the functionality provided in your software implementation back to the specific requirement for that function in your system description. This must be done by mapping the user stories that represent your system requirements to the various classes and methods of those classes that you have implemented in your software solution.

You must also provide for each trace back a short explanation as to how the mapped class and /or method directly contributes to satisfying the “So that…” aspect of the user story involved.

A recommended approach here is to tabulate your mappings so they can be easily traced.

Part 4 Reflective Report

You are to write a short reflective report (guideline word count 500 words) focussing on one future trend in computing and considering how new ideas and theories could be applied in the application domain you have developed for this assignment.

   

You should consider both the potential benefits of the new ideas as well as the inherent complexities and present your reasoned evaluation and conclusions regarding the application of those new ideas within your chosen domain.

If your application is work related, you could conclude your reflective evaluation with recommendations relevant to your employer regarding the adoption, or otherwise, of new advanced computing techniques.

For this reflective report you could consider any one of the following topics or chose any other current computing topic:

  Big Data / Data mining or analytics / Data visualisation

  Artificial Intelligence / Machine learning

  Robotics and Social Interaction

  Virtual or Augmented reality

  Security within Cloud computing

  The internet of things (IoT)

  Autonomous Transportation

  Wearable devices and sensors

You are not expected to reference research papers or present a very technical explanation of the topic – rather you are expected to focus on the advantages and complexities of applying the theory in your application area.

You should start your reflective report with a short description of your chosen topic (250 words or thereabouts would be appropriate for this) before presenting your evaluation of its application.

Citations of web sources for this is perfectly fine but your sources must be correctly cited and a reference list provided (as per the Harvard referencing scheme).

Quotations should be kept to a very minimum and 90% of the words should be your own.

Deliverables

A zipped archive of your main Python project folder which must include all relevant files need to both run your software implementation and run the automated unit tests. Also, include in this archive the word processed document that contains the concise description of the system and the associated user stories  (as  required in  Part  1).  Any details of  further  instructions  or  any additional Python 3 libraries (beyond those in the standard Python 3 installation) must also be provided in a  readme.txt file (to ensure your software implementation can be run). Provide this archive as a single zip file. This archive will be used when you provide your demonstration of your system.

A single word processed document that contains the traceability and reflective reports required for the Part 3 and Part 4 tasks. Make sure this document is

  

clearly organised into titled sections and that any diagrams and images are referenced with a figure number. Ensure it is evident which of these sections relates to which assessment task to avoid any ambiguity when your work is considered during marking. 

Also, ensure you provide any referenced work within this document (as per the normal Harvard referencing scheme).

Data Analysis

https://lionbridge.ai/datasets/10-open-datasets-for-linear-regression/
– https://careerfoundry.com/en/blog/data-analytics/where-to-find-free-datasets/
OR ANY REPUTABLE SOURCE OF DATA.
Write a 2 page (minimum) paper.  In the paper, define the problem that you are analyzing.  What is the question that you want to be answered from the data?  What is your hypothesis?
25%:  Analysis of the dataset (explain the data and also perform a statistical analysis).  Speak to which features you kept and why. 
25%: Use the techniques learned in this class and discover at least 1 “AHA” in the data.  By that, I mean that I expect you to discover a relationship between two variables or an INSIGHT into the data.  Explain your findings.
25%: Define which visualization(s) you choose to use and why you chose them.  I expect the visualizations to be professional and readable by themselves without references to anything else.  (I am not going to be looking through your data to try to understand your visual).  Attach your visuals to the end of the document.  Create a Tableau Story that combines your visuals and provide the link to it in the document.
15%: Summarize your work from a social or business perspective.  Why is this important?  How could this insight be used to make a difference?
CITE YOUR SOURCES and add them to the end of your paper.  (I recommend citefast.com.  You can cite all of your sources there and export to word and just add it to the end of your paper.)
In summary – you will turn in:
A 2-page Analysis
A page (or 2) of Visualizations
A list of your sources/references

Security Architecture Assignment

Minimum Length 700 Words.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

Business Strategy

 Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver? 

Strategic IT Plan

  

Strategic IT Planning: Your 3-Step Process

Introduction

Strategic IT Planning is required to ensure your resources and assets continue providing the results and the support your organization needs.

What is a Strategic Plan?

It is a roadmap to achieving a goal. It may cover your entire department or responsibility or it may focus on a specific issue or element of your role. It can be long and involved or a simply one-page document that provides guidance and steps you need to implement to achieve a goal.

Making it Happen

There are a few things that are important to your success. While it may seem that developing the Strategic Plan is the hardest part, most plans fail because of the implementation. The key is to keep it small and be successful, then build on that success for the next initiative. Don’t bite off too much or try to be too ambitious.

• Take your time and keep it manageable

• Link your plan to your company’s strategy

• Justify your initiative and get buy-in and support

• Don’t re-invent, rebuild

• Go slow, manage change

• Set aside time from your operational responsibilities to make it happen

Without a Strategic Plan, you and your team won’t be effective and you won’t be able to get results, get attention and get ahead.

Why you need an IT Strategy:

Redirect from tasks to opportunities and result

• Switch from fighting fires to preventing fires

• Reduce risk with planning and a longer view

Most Strategic Plans never get written or they fail because they are too involved and complex. Keep them simple and use these three basic steps as your core approach. Ask yourself these questions:

1. Why do you need to do it? What is your goal?

2. What are the things you need to get done to achieve your goal?

3.  How can you make those things happen?

By following the 3 steps above and writing them down, you will have the outline of your Strategic IT Plan. Then, you establish the tactical things that will help you implement your plan.

Implementation Plan

Once you have established your strategic plan using the 3-step process, you need to develop your implementation plan. This includes getting approval and resources as well as the steps you need to take to achieve your strategic objective.

1. Set the objective for each step

2. Analyze internal/external factors

3. Develop solutions

4. Identify and eliminate barriers

5. Allocate resources (people, time, money)

6. Develop detailed tasks

7. Implement your plan!

Step Implementation

What Are The Roadblocks?

How Can You Overcome The Roadblocks?

What Resources Do You Need?

What Are The Timelines?

What Are The Main Steps To Implement Your Plan?

research questions and hypotheses

 Primary Task Response: Within the Discussion Board area, write 300–500 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Quantitative research questions use the scientific method to answer and, therefore, each research question has two associated hypotheses.

  • What are the differences between research questions and hypotheses?
  • What key information needs to be included in quantitative research questions and hypotheses?
  • Provide an example of one quantitative research question and its two associated hypotheses.

Data analytics

  

1 Financial Condition of Banks. The file Banks.csv includes data on a sample of 20 banks. The “Financial Condition” column records the judgment of an expert on the financial condition of each bank. This outcome variable takes one of two possible values—weak or strong—according to the financial condition of the bank. The predictors are two ratios used in the financial analysis of banks: TotLns&Lses/Assets is the ratio of total loans and leases to total assets and TotExp/Assets is the ratio of total expenses to total assets. The target is to use the two ratios for classifying the financial condition of a new bank. Run a logistic regression model (on the entire dataset) that models the status of a bank as a function of the two financial measures provided. Specify the success class as weak (this is similar to creating a dummy that is 1 for financially weak banks and 0 otherwise), and use the default cutoff value of 0.5. 

a. Consider a new bank whose total loans and leases/assets ratio = 0.6 and total expenses/assets ratio = 0.11. From your logistic regression model, estimate the following four quantities for this bank (use R to do all the intermediate calculations; show your final answers to four decimal places): the logit, the odds, the probability of being financially weak, and the classification of the bank (use cutoff = 0.5). 

b. The cutoff value of 0.5 is used in conjunction with the probability of being financially weak. Compute the threshold that should be used if we want to make a classification based on the odds of being financially weak, and the threshold for the corresponding logit. 

c. When a bank that is in poor financial condition is misclassified as financially strong, the misclassification cost is much higher than when a financially strong bank is misclassified as weak. To minimize the expected cost of misclassification, should the cutoff value for classification (which is currently at 0.5) be increased or decreased?

2. Competitive Auctions on eBay.com. The file eBayAuctions.csv contains information on 1972 auctions transacted on eBay.com during May–June 2004. The goal is to use these data to build a model that will distinguish competitive auctions from noncompetitive ones. A competitive auction is defined as an auction with at least two bids placed on the item being auctioned. The data include variables that describe the item (auction category), the seller (his or her eBay rating), and the auction terms that the seller selected (auction duration, opening price, currency, day of week of auction close). In addition, we have the price at which the auction closed. The goal is to predict whether or not an auction of interest will be competitive. Data preprocessing. Create dummy variables for the categorical predictors. These include Category (18 categories), Currency (USD, GBP, Euro), EndDay (Monday–Sunday), and Duration (1, 3, 5, 7, or 10 days). 

a. Create pivot tables for the mean of the binary outcome (Competitive?) as a function of the various categorical variables (use the original variables, not the dummies). Use the information in the tables to reduce the number of dummies that will be used in the model. For example, categories that appear most similar with respect to the distribution of competitive auctions could be combined.

b. Split the data into training (60%) and validation (40%) datasets. Run a logistic model with all predictors with a cutoff of 0.5. c. If we want to predict at the start of an auction whether it will be competitive, we cannot use the information on the closing price. Run a logistic model with all predictors as above, excluding price. How does this model compare to the full model with respect to predictive accuracy? 

d. Interpret the meaning of the coefficient for closing price. Does closing price have a practical significance? Is it statistically significant for predicting competitiveness of auctions? (Use a 10% significance level.) 

e. Use stepwise selection (use function step() in the stats package or function stepAIC() in the MASS package) and an exhaustive search (use function glmulti() in package glmulti) to find the model with the best fit to the training data. Which predictors are used? 

f. Use stepwise selection and an exhaustive search to find the model with the lowest predictive error rate (use the validation data). Which predictors are used?

Graph Algorithm Assignment

Graphs (Help! Really challenging assignment. Would appreciate any bit of help!)

Family tree’s and genealogy software has become more and more prevalent in recent years. From the name you might expect that a family tree would be easily represented by a tree structure, but that is not the case! A more appropriate data structure to represent a family tree would be a type of graph. Using the description of the family that accompanies this assignment, you must represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file. Additionally, I also want there to be an interface in which a user can create a new family member and add them to the tree. This can be a simple CLI where the user provides a name, gender, and age to create a person. Then another simple CLI where they select which member of the family they want the original relationship to be with and what kind of relationship it should be. Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship. Remember the DRY philosophy, where code can be modularized or made into a function, it should be if you plan on using the logic again.

Finally, I want you to make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person can not marry themselves, a person can not be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exists as part of the family tree, not as part of the graph.

As a hint, for a successful design: I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore those should be your function calls.

Submission Goals

(120 pts.) Create a FamilyTree class that will represent a family tree for a given family.
The class should contain several types of relationships that commonly happen within a family (siblings, marriage, offspring, etc.)

(40 pts.) Programmatically add the family members to the graph as described by the accompanying family description file.
(40 pts.) Give data assertions to the FamilyTree class to enforce restrictions for basic family structure (at least 3); i.e A person can not marry themselves.

(40 pts.) Provide a simple CLI the enables users to add, remove, and edit family members.

graph.py

graph = dict()

graph[‘A’] = [‘B’, ‘C’]

graph[‘B’] = [‘E’,’C’, ‘A’]

graph[‘C’] = [‘A’, ‘B’, ‘E’,’F’]

graph[‘E’] = [‘B’, ‘C’]

graph[‘F’] = [‘C’]

matrix_elements = sorted(graph.keys())

cols = rows = len(matrix_elements)  

adjacency_matrix = [[0 for x in range(rows)] for y in range(cols)]

edges_list = []

for key in matrix_elements:

    for neighbor in graph[key]:

       edges_list.append((key,neighbor))

print(edges_list)

for edge in edges_list:

        index_of_first_vertex = matrix_elements.index(edge[0])

        index_of_second_vertex = matrix_elements.index(edge[1])

        adjacency_matrix[index_of_first_vertex][index_of_second_vertex] = 1

println(adjacency_matrix)

WutherHeightsFamilyTree.docx

The Extended Families of Wuther Heights (Modified):

Family 1

Patrick Earnshaw (M) {id: 001}

Hannah Earnshaw (F) {id: 002}

Relationship: Married

Children:

Catherine Earnshaw (F) {id: 003}

Hindley Earnshaw (M) {id: 004}

Family 2

Andrew Linton (M) {id: 005}

Dolores Linton (F) {id: 006}

Relationship: Divorced

Children:

Isabella Linton (F) {id: 007}

Edgar Linton (M) {id: 008}

            Heathcliff Linton (M) [Adopted] {id: 009}

Family 3

            Hindley Earnshaw (M) {id: 004}

            Frances Byler (M) {id: 010}

            Relationship: Married

            Children:

                        Hareton Earnshaw (M) [Adopted] {id: 011}

Family 4

            Catherine Earnshaw (F) {id: 003}

            Edgar Linton (M) {id: 008}

            Relationship: Married

            Children:

                        Cathy Linton (F) {id: 012}

Family 5

            Isabella Linton (F) {id: 007}

            Children:

                        Linton Heathcliff (M) {id: 013}

Family 6

            Heathcliff Linton (M) {id: 009}

            Children:

                        Linton Heathcliff (M) {id: 013}

Family 7

            Hareton Earnshaw (M) {id: 011}

            Cathy Linton (F) {id: 012}

            Relationship: Married

Family 8

            Cathy Linton (F) {id: 012}

            Linton Heathcliff (M) {id: 013}

            Relationship: Divorced

case study

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.