skip to Main Content

Identify some published technical or research paper, report, or article related

Identify some published technical or research paper, report, or article related to the topic of security authentication, cryptography, cloud security, threat analysis, hacking, or any other topic related to the course that you find to be a well-written and interesting piece. Write an essay explaining the main points of the paper you selected, and offer your personal perspective on whether you agree or disagree with the author's main points. Recommend book: "From CIA to APT: An Introduction to Cyber Security,"…

What are the main goals behind knowing Artificial Intelligence? Can it get used

What are the main goals behind knowing Artificial Intelligence? Can it get used for implementing human intelligence in the machines? Discuss the various types of Artificial Intelligence. What are the points of difference between them? What are the main applications of using Artificial Intelligence? How it gets used as a problem-solving technique through reasoning?

1) A summary list of each of the health problems that can arise from smoking. 2)

1) A summary list of each of the health problems that can arise from smoking. 2) List the three main dangerous Chemicals in cigarettes smoke. 3) Details of the effects of cigarette smoke on cilia cells, on alveoli and leading to bronchitis. 4) An explanation of the disease emphysema, and lung cancer, and their effects on the health. 5) A description of the effects of carbon monoxide in cigarette smoke. 6) Conclusion (give advice to smokers, or potential smokers). 

**FIRST PAGE:** Read all of the directions before starting this assignment.  Ty

**FIRST PAGE:** Read all of the directions before starting this assignment.  Type a report that describes the concerns pertaining to social, ethical, legal, and human issues of technology.  The report must be one page (single-spaced, 12 point font) and must answer the following questions: •  What is the definition of cyberbullying? •  What types of consequences can occur as a result of cyberbullying? •  What can teachers, parents, administrators, counselors, etc. do to prevent cyberbullying? •  What can students do…

Here is the Intro and work related sections COMPLETED ( see MyPaper attached). P

Here is the Intro and work related sections COMPLETED ( see MyPaper attached). Please finish the rest of the sections so it looks like the sample( See PAPER SAMPLE attached as a reference). In order to do this: You must create a Jupyter Notebook with detailed comments of why you did what you did with each coding block. See Coding Example attached of similar dataset with different research objectives at the links below: https://github.com/mrinmaisharma/Online-Retail-Dataset/blob/master/script.ipynb https://github.com/scheckley/online-retail/blob/master/analysis.ipynb Note: I want mine to…

1.    Discuss techniques for combining multiple anomaly detection techniques to

1.    Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases. 2.    With the ever-increasing use of web and social-media data, data scientists must often perform text mining. Define and describe text mining. Then, describe the available tools. 3.    With cameras becoming ubiquitous, more and more companies and agencies are leveraging image recognition—often for security purposes. Discuss whether such applications pose privacy threats.

1.    Clustering is the process of grouping data. There are many different clust

1.    Clustering is the process of grouping data. There are many different clustering algorithms. Research and describe three clustering algorithms. Then, describe when you would use each algorithm. 2.    There are many different clustering tools. Assume you have been hired as a data scientist for an e-commerce company. Research the available clustering tools and select one. Justify your recommendation.

Business concerns today call for industries to work with multiple worksheets for

Business concerns today call for industries to work with multiple worksheets for a variety of reasons. Some of those reasons include budgeting concerns, year-end predictions, multiple departments, and multiple locations. Discuss the challenges of working with multiple worksheets, the importance of pulling data from various worksheets into a single worksheet, and the ways in which an Excel 3-D worksheet could be a solution to a complex challenge.