Artificial Neural network and Deep learning

Chapter 5

Discussion Question 1: What is an artificial neural network and for what type of problem can it be used for?

Discussion Question 2: Compare artificial and biological neural networks. What aspect of biological networks are not mimicked by artificial ones? What aspects are similar?

Discussion Question 3: What are the most common ANN architectures? For what types of problem can they be used?

Discussion Question 4: ANN can be used be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

Exercise 6: Go to Google Scholar (scholar.google.com) Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.

Internet Exercise 7: Go to http://www.neuroshell.com/examples.html. Look at USG Corporation example. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

Chapter 6 

Discussion Question 1: What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

Discussion Question 2: List and briefly explain different learning paradigms/methods of AI.

Discussion Question 3: What is representation learning, and how does it relate to machine learning and deep learning?

Discussion Question 4: List and briefly describe the most commonly used ANN activation functions.

Discussion Question 5: What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

Exercise 4: Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy! cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to resolve complex real-world problems. Summarize your findings in a professional organized report.

Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

Your response should be 5-6 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

P3

Review the project and type  Type the command here (highlighted in Yellow color) and capture a screenshot.

 

Weekly Learning and Reflection 

In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this project. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you’re confused about. Questions asked here will be summarized and answered anonymously in the next class.

software enginnering term paper

 Project Management Style Term Paper Instructions: The most important aspect of this course will be a survey comparison report comparing and contrasting Agile, Scrum, Waterfall, and Strategic project management styles to each other in your paper. For each project management style excluding Waterfall, how would the software development process have changed if that style had been applied to last semester’s project. Discuss the potential risks and rewards of utilizing each project management style to your previous semester’s team project. Briefly describe and outline how you would have approached last semester’s team project with each of these styles (Agile, Strategic, Scrum). What are the key advantages and disadvantages of each project management style? What are the key differences between each style? How are each of these project management styles applied to software engineering projects today? Cite some scholarly or industry related case studies that apply these project management styles to software engineering projects. This includes white papers, conference papers, journal articles, or industry reports. Your term paper should include references from at least 5 primary scholarly sources to support your comparisons of these project management styles and methodologies. Again, these sources should comprise more recently published scientific books, journal articles, conference papers, published technical reports and/or summaries, or any sources posted inside any of the respected scholarly databases accessible via the JSU Library or its online databases. If you have a questions as to the legitimacy of a source, then please ask me by e-mail anytime. Note that Wikipedia does not count as a legitimate source of scholarly work so please avoid using it. Also, please do not rely on your textbook as one of your five minimum primary sources on these project management styles should come from more recent scholarly works. Term Paper Specifications: The length of the term paper should comprise no more than 20 pages (doublespaced, 12 pt. font, left-aligned, Times New Roman) that includes a title page, a table of contents object (section headings with page numbers), the report body of your term paper neatly organized into appropriately formatted and named sections, and a References page organized in MLA format for your scholarly references. Note that while there is no minimum page limit, you will need to write your term paper with sufficient detail to cover these areas as befitting this graduate software engineering class. 

Mobile forensics

 please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Internet of Things

Please read Chapter 13: The Internet of Things as a Platform for Intelligent Applications  from the attached book and answer the following questions. 

  1. Compare the IoT with regular Internet.
     
  2. Discuss the potential impact of autonomous vehicles on our lives.
     
  3. Why must a truly smart home have a bot?
     
  4. Why is the IoT considered a disruptive technology?  

5.   AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary. 

6.   It is said that the IoT will enable new customer service and B2B interactions. Explain how. 

7.   Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.
 

Answer these questions in APA 7th edition format and include atleast 4 references, including 2 scholarly references. All answers should be completed in total 4 to 5 pages. STRICTLY NO PLAGIARISM

response 1

 

responds to peer based on the following response minimum of 100 words : In every large group meeting I have attended whether at a new job, my kid’s school, open houses, etc. There were PowerPoint presentations. This program is a particularly effective way to get a lot of information to a group of people effectively and in a timely manner. Truthfully, at some points in Power Point slide shows, especially long ones, my eyes tend to glaze over, and I zone out and lose focus.  

I think some key considerations you must have when developing your slide show are how engaging it is and how effectively you are communicating the information you must give. Paying close attention to what the prestation look like from the viewer’s standpoint rather than the presenter’s would be an excellent way to approach it. Are the slides cohesive? Easy to follow? Having different elements (I.e.. Bullets, photos, color schemes, varying font sizes, etc.) would be a plus too because it keeps your audience from just staring at paragraph after paragraph thus keeping their attention. 

paper

See how to create an example web service in Android. Page 174,  Chapter 6 Getting Started with Android – Alternative Formats
See how to create an example web service in iOS. Page 214,  Chapter 7 Getting Started with iOS – Alternative Formats

For submission : Read carefully about 2 different approaches for creating a web service from above. Then

(a) compare the two approaches and

(b) explain 2 advantages of each approach relative to the other.