Presentation

Imagine your organization is going to build an application utilizing Big Data and Machine

Learning. You are going to propose to upper management of your idea with supporting system

design. Develop an APA formatted paper that presents a detailed analysis and research-based

information pertaining to ALL of the following topics;

● List and describe the type of data you will need for your application, and how you will

ensure the quality of the data.

● List and explain the technologies, tools and software packages that will be used to build

the application.

○ Provide the design of your Big Data database. Explain why you chose the

database compared to others. Also, include supporting theories for the schema

you came up with.

○ Describe in detail why the chosen technologies are adequate to process the

data.

○ List and describe the types of the statistical analysis methods that will be used.

MSIT 690 Syllabus

18 of

● List and describe the benefits from the customer’s perspective and organization’s

perspective. Please pinpoint where the benefits are drawn from – data, technology,

software package, process, and etc.

● List and describe the concerns and downsides that may be introduced by the

application and the Big Data from multiple perspectives – law, regulations, social and

etc. Provide solutions, processes, application modules, and etc. that mitigates the

concerns, problems, issues.

● Provide data flow diagram, database design, and sample code of a module for your

application.

Present it in 10 slides.

DSBDA W 3 D

 

As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

CSCI 457 Assignment 3 – Biography Viewer

Choose one of your favorite games, and implement an app that shows the biography of each character of the game.

Requirements:

  • Your app should show a list of characters in the main view using a table view.
  • A small icon and some brief information of each character should be displayed in the table
    view.
  • The user can scroll up and down to see the full list.
  • The user can swipe right to reveal two buttons to favorite a character or unfavorite a
    character.
  • A checkmark is displayed for each favorite character, and the checkmark is removed if the
    character is unfavored.
  • The user can touch a character to open a detail view to see the character’s large portrait and
    full biography.
  • Do not use parallel arrays. Use a class for the characters.

Prof writing & proposal Devel(DSRT) 2.1Question

 

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question. 

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Digital Forensics

  

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

MSDF-630: Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in MSDF-630 provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Use the Web to search for examples of hacks that made the news.Write a brief description of the attack

Use the Web to search for examples of hacks that made the news.Write a brief description of the attack indicating what type of hack was involved. Read and respond to at least two other students Discussions.Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.Post between 200 and 300 words. 

Prim's Algorithm

  

The problem we can solve using a priority queue is that of computing a minimum spanning tree. Given a fully connected undirected graph where each edge has a weight, we would like to find the set of edges with the least total sum of weights. Using the scenario: 

You are an engineer and you are trying to figure out the best way to arrange for internet access in your Town. There are N (3 ≤ N ≤ 25) blocks in your town connected by M (N ≤ M ≤ 25) various streets and you can walk between any two streets in the town by traversing some sequence of roads. 

However, you have got a limited budget and have determined that the cheapest way to arrange for internet access is to build some fiber-optic cables along existing roadways. You have a list of the costs of laying fiber-optic cable down along any particular street, and want to figure out how much money you will need to successfully complete the project, meaning that, at the end, every street will be connected along some sequence of fiber-optic cables. 

As a computer scientist, you heard about Prim’s algorithm in one of your programming classes. This algorithm is exactly the solution to your problem, but it requires a priority queue.

  

· Write a program to create using a priority queue to implement a solution of Prim’s algorithm.

  

Input data describing the graph will be arranged as a list of edges (streets and their fiber-optic cost) and for the program we will covert that to an adjacency list: for every node in the graph in the town, we will have a list of the nodes (streets) it’s connected to and the weight (cost of building fiber-optic cable along). 

adj[0] → (1, 1.0) (3, 3.0)

adj[1] → (0, 1.0) (2, 6.0) (3, 5.0) (4, 1.0) . . .