computer

Research Project Instructions

5G

5G Cell communication is gradually been adopted by telecommunications providers across the country. 

However, there are technical problems to overcome, including that the higher frequencies cannot even 

penetrate a pane of glass. 

Security alarms have been raised everywhere, from the ridiculous to the political. Do as much research 

as you can on the threats of 5G and tell me about what you can find. You should be able to find 

everything from hacking issues, to privacy issues, to frequency issues, to political and nation state issues,

to manufacturing issues, and maybe others. What are the dangers you found and how real are each of 

them? Be sure to give sources of your research

Note:
Irrespective of the option you choose, your paper must have at least 5 sources. Include in-text
citations and a reference section. The reference section does not count towards the total number of
pages. Make it double spaced with a minimum font size of 11.
It’s worth noting that Wikipedia does not count as a reliable source in academic writing. Use APA or IEEE
for your citations.
Some sources to consider:
https://www.pcc.edu/library/databases/#group=databases&subject=computers-math-
engineering&format=articles-full-text&peer_reviewed=0
APA Citation Guidelines
:
https://www.pcc.edu/library/research/citation-style-guidelines-and-samples/
IEEE Citation Guidelines:
https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation
%20Guidelines.pdf
,
Research Help Appointments at PCC
:
https://www.pcc.edu/library/research/research-help-
appointments/

Data Analysis

 

In this assignment, you will perform an exploratory analysis that will allow you to get a feel for the data and start exploring potential relationships. This may include:

  • Descriptive statistics
  • Histograms
  • Bar charts
  • Heat maps
  • Line graphs
  • Box plots
  • Frequency tables

Once your analysis is complete, you will need to provide a Word document showing and describing the results of your exploratory analysis.

2nd part

 

you will perform a model development on your dataset, following these step:

  1. Using your chosen dataset, reevaluate the heat map from the last module.
  2. Consider ways to perform a visual check to see if there is a relationship between fields.
  3. With this insight, develop a model using either linear regression or multiple linear regression.
  4. Report the intercepts, slope, model accuracy, output to predicted comparison, and a scatterplot with line portraying the model.

Once you complete these steps, you will need to provide a Word document showing and explaining the results of your model development. 

Intern 1

  

1. This Internship Experience is an opportunity for you to work and learn at the same time. Please explain your Internship/ Job by answering these questions. What does the company do? What is your job title?

2. What are your responsibilities? Give Examples

3. What are your future career goals for yourself?

4. How is this Internship experience going to help you meet your goals? Give examples

5. How are the other classes you are taking this term going to help you with this Internship Experience? Give Examples

SE493 week 5

Discussion 5: ( Required Posting)

Due: Please post your initial discussion No later than Thursday or Friday of this week. (80 Points)

Due :Peer/Classmate review/comment: Provide comments to other class members No later than Friday or Saturday of this week. Please mention the classmate/s name.(20 points)

Please take a few minutes and check the discussion board on Sunday and make sure to reply to peer comments OR my comments/query.

Please read IGU Grading Rubric  and late participation grading policy for discussion posted under policy section course modules.

Discussion Topic 

During the past 4 weeks you have studied several software methodology techniques. Discuss what methodology or subject that you have learned has been your favorite topic/subject? Write a paragraph and briefly discuss and share your learning experience with classmates.

Please list your reference

Digital Logic Lab- secret key of 6 bits

It is a project for digital logic.

Project report requirements:
o A brief description of the design process you used to obtain the circuits. Be sure to point
out  why  you  chose  a  particular  design,  along  with  the  steps  you  took  to  minimize  the  
amount of hardware required. This includes
 State diagram
 State reduction
 Final (reduced) state table
o Include all design elements, such as truth tables, state diagrams, tables, etc,
o Test the device in the simulator. Include a test plan:
 Include your secret code for verification
 Example inputs, expected outputs and what happened when you tested.
 Descriptions, along with a detailed explanation of what simulations you did, what
they show, to demonstrate that the circuit works properly under “all” circumstances.
NOTE that all Logisim implementations must meet all labeling requirements, as established at the
start of the semester (see Lab 1)
Project Description
There  are  many  security  and  access  control  devices  on  the  market  that  attempt  to  prevent
unauthorized access to secured areas. One such device is a key-pad based device. To unlock the
door, you must enter a secret decimal code. For example, say a device accepts a 4-digit decimal
code, 1234. The device will unlock the door when “1234” is entered, but it will not unlock if “123”
or “123411” is entered.
For your final project, you are to design an access control system based on a sequence of 6 bits
that accepts a 1-bit at a time, either 0 or 1. This could be implemented with a 2-button keypad (o
and 1), used to enter the binary code.  
A second input functions as the Enter key, which ends the key code entry. As the key is entered,
the device outputs Enter = 0 until the input sequence terminates. If the input sequence matches the
access code, then output Enter =1  (for example LED lights up), which will unlock the door in a
full implementation. The secret code is preset: choose your own code (see below).
After two unsuccessful attempts (i.e. the secret code was not matched), the system shuts down and
won’t  accept  any  more  bits,  and  an  alarm  is  triggered.  Thus,  your  circuit  has  a  second  output
Alarm, which is set to 1 after two unsuccessful attempts.
Extra credit: Add a reset to the system that presumably only the owner could control: when the
reset key is inserted, the system is again enabled and can accept bits again. You can code the reset
as either 0 (no key) or 1 (key inserted) for this project.
Secret code:  
 Each of you has their very own secret code: no 2 people in the class can have the same
code
 Your code can NOT be a simple sequence of all 1s or all 0s, and must contain a minimum
of 2 ones and 2 zeroes

ITS-836 – Data Science & Big Data Analytics – Discussion

Subject: ITS-836 – Data Science & Big Data Analytics

Reading Resources: 

Cappa, Oriani, R., Peruffo, E., & McCarthy, I. (2021). Big Data for Creating and Capturing Value in the Digitalized Environment: Unpacking the Effects of Volume, Variety, and Veracity on Firm Performance. The Journal of Product Innovation Management, 38(1), 49–67.

Maqueira-Marín, Bruque-Cámara, S., & Minguela-Rata, B. (2017). Environment determinants in business adoption of Cloud Computing. Industrial Management + Data Systems, 117(1), 228–246.
 

Psomakelis, Aisopos, F., Litke, A., Tserpes, K., Kardara, M., & Campo, P. M. (2016). Big IoT and social networking data for smart cities: Algorithmic improvements on Big Data Analysis in the context of RADICAL city applications.
 

Chan, Cheung, C. M. K., & Wong, R. Y. M. (2019).
Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives. Journal of Management Information Systems, 36(2), 574–609.

Word count: 300+ words 

Discussion: Data analytics offers many benefits and challenges to organizations locally and globally. Find an organization with a data analytics use case.

– Please cite properly in APA 7· 

– At least one scholarly source should be used. · 

– Use proper citations and references in your post.

– Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.  

Note: plagiarism check required, APA7 format, include References, within 8hrs

NOTE THE TOPIC IS:Why dell sustain its competitive advantages

You are required to write a 4,000 word (with 10% over/under) research paper based on your practical project for this module. The paper should contain rigorous evidence and references from the primary (your own effort of social data harvesting) and/ or secondary data collection (third-party available dataset or current literatures) you undertook.   Research Rationale and MotivationAs part of practical research in this module and learnt from the weekly studios, you will be harvesting a suitable dataset using the relevant tools, i.e. Tableau, Python, Facebook or Twitter API or third party Tool(s) and extracting relevant information from the results.  Therefore, you should start your paper with the motivation or rationale of your research, especially the business aim of your project. The design and approach of your project such as the reasons for the choice of social web harvesting, scope for strategic or tactical decision making, business values, public interest, marketing campaign, product reviews, branding and marketing, customers’ preferences or other etcResearch Tools and MethodsYou need to discuss your research into suitable tools and/ or APIs and the justification for your choice. Based on this, you should then document the design of your project and show clearly how your research project communicates with any third-party service or API. Results and VisualisationsYou should discuss the results with necessary business or social implications and relate that back to the motivation or rationale of your social media project. Visualisation is very important, so the report should also contain suitable visualisations for your business storytelling out of the social data you collected. Limitations and ImplicationsIn addition, project limitations and recommendations are desirable. Conclusion and AppendicesFinally, draw a conclusion with key results to nicely conclude your web harvesting research. You are encouraged to compare various technical tools and techniques to demonstrate the social media analytics skills you have learnt. You can implement your social web harvesting research project using any suitable language / technology / third-party tools you see fit. You can hard-code queries or you can provide a suitable front-end where users can enter search keywords. In addition, you can show the results in any suitable form, e.g. tables, various forms of innovative graphs or information overlaid on a map. The final visualisation needs to be published on Tableau Public and include the link and evidences in the paper as Appendixes. 

Additional Information 

Referencing Requirements (Harvard)

The Harvard (or author-date) format should be strictly used for all references (including images). Further information on Referencing can be found at Cardiff Met’s Academic Skills website. 

Edit question’s