Adaboost

 

1. Consider running the Perceptron algorithm on a training set S arranged in a certain order. Now suppose we run it with the same initial weights and on the same training set but in a different order, S 0 . Does Perceptron make the same number of mistakes? Does it end up with the same final weights? If so, prove it. If not, give a counterexample, i.e. an S and S 0 where order matters.

 2. We have mainly focused on squared loss, but there are other interesting losses in machine learning. Consider the following loss function which we denote by φ(z) = max(0, −z). Let S be a training set (x 1 , y1 ), . . . ,(x m, ym) where each x i ∈ R n and y i ∈ {−1, 1}. Consider running stochastic gradient descent (SGD) to find a weight vector w that minimizes 1 m Pm i=1 φ(y i · w T x i ). Explain the explicit relationship between this algorithm and the Perceptron algorithm. Recall that for SGD, the update rule when the i th example is picked at random is wnew = wold − η∇φ  y iw T x i . 

3. Here we will give an illustrative example of a weak learner for a simple concept class. Let the domain be the real line, R, and let C refer to the concept class of “3-piece classifiers”, which are functions of the following form: for θ1 < θ2 and b ∈ {−1, 1}, hθ1,θ2,b(x) is b if x ∈ [θ1, θ2] and −b otherwise. In other words, they take a certain Boolean value inside a certain interval and the opposite value everywhere else. For example, h10,20,1(x) would be +1 on [10, 20], and −1 everywhere else. Let H refer to the simpler class of “decision stumps”, i.e. functions hθ,b such that h(x) is b for all x ≤ θ and −b otherwise. 

(a) Show formally that for any distribution on R (assume finite support, for simplicity; i.e., assume the distribution is bounded within [−B, B] for some large B) and any unknown labeling function c ∈ C that is a 3-piece classifier, there exists a decision stump h ∈ H that has error at most 1/3, i.e. P[h(x) 6= c(x)] ≤ 1/3. (b) Describe a simple, efficient procedure for finding a decision stump that minimizes error with respect to a finite training set of size m. Such a procedure is called an empirical risk minimizer (ERM). 

(c) Give a short intuitive explanation for why we should expect that we can easily pick m sufficiently large that the training error is a good approximation of the true error, i.e. why we can ensure generalization. (Your answer should relate to what we have gained in going from requiring a learner for C to requiring a learner for H.) This lets us conclude that we can weakly learn C using H. 

Current Events

Consider a specific current malware in the news or blogs and discuss these questions:

  • Describe the malware. Include a reference to your (public) source material. Be sure to answer the following questions
    • Who does the malware typically target? 
    • What might be the attacker’s goal?
    • What types of mechanisms or exploits do the attackers use to gain access? 

Business Process and UML

Assignment 1:

 Research a scholarly paper or professional video on Business Processes, and Process Specifications” and reflect on only one (1) of the following topics:

  • “Processes”: What type of Business Processes exist?
  • “Specifications”: How important is it to define the Process Specifications?
  • “Review”: How important is it to review the Processes on a regular basis?

NOTE:
You must copy and paste the topic (“Processes” or “Specifications” or “Review”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource. 

Assignment 2:  Research a scholarly paper or professional video on Unified Modeling Language (UML)”  and reflect on only one (1) of the following topics:

  • “Benefit”: What UML diagrams are most beneficial for organizations? 
  • “Most”: What organizations use UML diagrams the most?
  • “Effort”: Is the effort to create a UML diagram worth their benefit to the organization?

NOTE:
You must copy and paste the topic (“Benefit” or “Most” or “Effort”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource. 

Computer Science- Analyzing and Data Visualization ITS 530

Review the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria.  She wants to live in an area with lower crime but wants to know a few things:

  1. Is it more expensive or less expensive to live in FL or NY?
  2. Is the crime rate higher in FL or NY (Note a low score in crime means lower crime)?
  3. Is the crime rate higher in lower or higher house price areas?

Using the R tool, show the data in the tool to answer each of the questions.  Also, show the data visualization to go along with the summary.

  1. If you were Suzie, where would you move based on the questions above?
  2. After you gave Suzie the answer above (to #4), she gave you some additional information that you need to consider:
    1. She has $100,000 to put down for the house.
    2. If she moves to NY she will have a job earning $120,000 per year.
    3. If she moves to FL she will have a job earning $75,000 per year.
    4. She wants to know the following:
      1. On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
      2. Where should she move and why?  Please show graphics and thoroughly explain your answer here based on the new information provided above.

Note: The screenshots should be copied and pasted and must be legible.  Only upload the word document.  Be sure to answer all of the questions above and number the answers.  Be sure to also explain the rational for each answer and also ensure that there are visuals for each question above. Use at least two peer reviewed sources to support your work. 

Problem 5- Project Process

Activity I: Product Development. Consider the simplified set of activities in the Table below for the development of a consumer product from initiation through the market test phase. 

Activity

Symbol

Immediate predecessors

Time estimate (weeks)

Investigate demand

A

3

Develop pricing strategy

B

1

Design product

C

5

Conduct promotional cost analysis

D

A

1

Manufacture prototype models

E

C

6

Perform product cost analysis

F

E

1

Perform final pricing analysis

G

B,D,F

2

Conduct market test

H

G

8

  1. Draw the AOA network for this project.
  2. Calculate total slacks and free slacks, and interpret their meaning. .
  3. Determine the critical path and interpret its meaning.
  4. Construct a Gantt chart and mark the latest start times for each activity.

Activity II: A project has 11 activities that can be accomplished either by one person working alone or by several people working together. The activities, precedence constraints, and time estimates are given in Table below. Suppose that you have up to five people who can be assigned on any given day. A person must work full days on each activity, but the number of people working on an activity can vary from day to day.

Activity

Immediate predecessors

Person-days required

A

10

B

A

8

C

A

5

D

B

6

E

D

8

F

C

7

G

E,F

4

H

F

2

I

F

3

J

H,I

3

K

J,G

2

  1. Prepare an AOA network diagram, and calculate the critical path, total slacks, and free slacks assuming that one person (independently) is working on each task.
  2. Prepare an early-start Gantt chart.
  3. Prepare a daily assignment sheet for personnel with the goal of finishing the project in the minimum amount of time.
  4. Prepare a daily assignment sheet to “best” balance the workforce assigned to the project.
  5. By how many days could the project be compressed if unlimited personnel resources were available?

Text-

Title: Project Management 

ISBN: 9780134478661 

Authors: SHTUB 

Publisher: Pearson 

Edition: 3RD 17

Usability Evaluation

 A Usability Evaluation examines the way users interact with products and services in order to achieve a goal. Oftentimes, there are measures that are tied to those goals that are quantified. Academic literature has a robust catalog of research on studies that examine various perspectives that explore user attitudes and experiences. Such attitudes and experiences include:

  • System Quality and Usability

Remember, usability is not one-dimensional. It is a complex system of properties. That integrates many factors. It is subjective from user to user. For this assignment, you are asked to explore one of these topics. You are to conduct an analytical research review of the assigned usability category/dimension above. Write a paper that consists of the following:

  • Abstract
  • Title Page
  • Introduction
  • Literature Review of Term
  • Conclusion

Considerations:

  • Must provide a minimum of seven sources that analyze the term and its meaning
  • Must analyze and compare the term and how it was evaluated by the authors/scholars in each study
  • Must evaluate the study method used to complete the analysis.
  • Identify any unique similarities or differences across each study.
  • Define your own term based on your understanding of the literature you’ve evaluated.
  • Explain how you derive this definition.
  • Qualify/quantify the definition by explaining how many sources you used to come up with this definition.
  • Make Recommendations of Additional Ideas For Future Literature Review Consideration
  • The paper should be a minimum of 10 pages. This does not include the cover page, abstract, or citations. You must use the APA format throughout the entire paper.

Benchmark – Small to Medium-Sized Business

 

IT risk management relies on end-user and administrative compliance with the rules, regulations, and polices set up as a means of protecting information assets within the environment. Comprehension of the consequences and rewards of policy adherence is necessary if security professionals are expected to implement security, and risk management strategies that rely on the strength of policy management and distribution.

In a 750- to 1,250-word paper, evaluate the implications of Internet use (including, but not limited to, basic web presence, online shopping, vendor unique portals, vendor specific portals, “IOT,” social media, and/or VPN use) within a SMB, as well as data protection for intellectual property. Make sure to address third-party vendors, cloud technology, and technology trends.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

3.4: Evaluate the implications of Internet use within Small to Medium-Sized Business (SMB) and data protection for Intellectual Property.

Cyber Security Phishing Playbook

Need a Cyber Security Phishing Playbook ( Incident Response guide ) 

 A Playbook in cybersecurity is usually referred to as a manual or set of  instructions that can be referenced to follow specific processes and  procedures depending on workflow and circumstances.  The term playbook  is probably borrowed from use in sporting events where teams will  practice specific plays in order to execute them with higher degrees of  efficiency during critical times.  The following is an example of  cybersecurity playbook that is open source found here

https://www.isecom.org/Open-Source-Cybersecurity-Playbook.pdf

heres a example of a Phishing playbook

 https://github.com/counteractive/incident-response-plan-template/blob/master/playbooks/playbook-phishing.md 

PYTHON FUNCTIONS

 

Part 1

Encapsulate the following Python code in a function named my_sqrt that takes a as a parameter, chooses a starting value for x, and returns an estimate of the square root of a. 

while True:
     y = (x + a/x) / 2.0
     if y == x:
          break
     x = y 

Part 2

Write a function named test_sqrt that prints a table like the following using a while loop, where “diff” is the absolute value of the difference between my_sqrt(a) and math.sqrt(a). 

a = 1 | my_sqrt(a) = 1 | math.sqrt(a) = 1.0 | diff = 0.0
a = 2 | my_sqrt(a) = 1.41421356237 | math.sqrt(a) = 1.41421356237 | diff = 2.22044604925e-16
a = 3 | my_sqrt(a) = 1.73205080757 | math.sqrt(a) = 1.73205080757 | diff = 0.0
a = 4 | my_sqrt(a) = 2.0 | math.sqrt(a) = 2.0 | diff = 0.0
a = 5 | my_sqrt(a) = 2.2360679775 | math.sqrt(a) = 2.2360679775 | diff = 0.0
a = 6 | my_sqrt(a) = 2.44948974278 | math.sqrt(a) = 2.44948974278 | diff = 0.0
a = 7 | my_sqrt(a) = 2.64575131106 | math.sqrt(a) = 2.64575131106 | diff = 0.0
a = 8 | my_sqrt(a) = 2.82842712475 | math.sqrt(a) = 2.82842712475 | diff = 4.4408920985e-16
a = 9 | my_sqrt(a) = 3.0 | math.sqrt(a) = 3.0 | diff = 0.0 

Modify your program so that it outputs lines for a values from 1 to 25 instead of just 1 to 9. 

You should submit a script file and a plain text output file (.txt) that contains the test output. Multiple file uploads are permitted.

Your submission will be assessed using the following Aspects.

  1. Does the submission include a my_sqrt function that takes a single argument and includes the while loop from the instructions?
  2. Does the my_sqrt function initialize x and return its final value?
  3. Does the test_sqrt function print a values from 1 to 25?
  4. Does the test_sqrt function print the values returned by my_sqrt for each value of a?
  5. Does the test_sqrt function print correct values from math.sqrt for each value of a?
  6. Does the test_sqrt function print the absolute value of the differences between my_sqrt and math.sqrt for each value of a?
  7. Does the my_sqrt function compute values that are almost identical to math.sqrt (“diff” less than 1e-14)?