Visualizing Protest Groups Over Time: Data Types and Distributions in R

R studio problem.
Code already runs fine, just need questions under this:
Create a graphic or graphics (choose which you think is best and explain why you chose it as a comment in your code or as a separate document) for the group protesting by date (assoc_actor1). Amongst the choices are a stacked bar graph and overlaid lines, but you are free to choose something else.
Identify the type of variable for each and the distribution for each (again, as a comment in your code or as a separate document
Have R return the data type for each variable. Did R guess the data type correctly?

Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!

Here are the questions you need under your R Studio problem:

  1. What type of graphic did you choose and why?

    • Explain whether you selected a stacked bar graph, overlaid lines, or another visualization and justify your choice.
  2. What type of variable is each one?

    • Identify the variable type for assoc_actor1 (categorical/nominal) and date (ordinal or continuous).
  3. What is the distribution of each variable?

    • Describe the distribution pattern (e.g., normal, skewed, uniform, or categorical frequency distribution).
  4. What data type did R assign to each variable?

    • Use class() or str() to check the data type for assoc_actor1 and date.
  5. Did R correctly guess the data type?

    • Analyze whether R correctly interpreted the data type and whether any conversions were necessary (e.g., converting factors to characters or dates).

Would you like a sample R code snippet to check and visualize this? 😊

Entity Relationship Diagram (ERD) Normalization: Achieving 3rd Normal Form

Preparatory Instructions:
Please be sure to read Chapter 6 – Data Modeling (pp 187 – 213, Systems Analysis & Design text).
Entity Relationship Diagrams (known as ERDs) depict the data that will be used and created in a system and provides business requirements details such as the type and amount of each data element as well as the relationships between data entities.
This week we will practice creating ERDs. You will find that ERDs are very commonly used and can be a critical tool used during requirements analysis and design phases.
Objectives:
This week’s assignment is to apply each Normalization rule to the Inventory Order model to reach the 3rd Normal Form.
The system development team at the Wilcon Company is working on developing a new customer order entry system. In the process of designing the new system, the team has identified the following data entity attributes:
Inventory Order
Order Number (identifier)
Order Date
Customer Name
Street Address
City
State
Zip
Customer Type
Initials
District Number
Region Number
1 to 22 occurrences of:
Item Name
Quantity Ordered
Item Unit
Quantity Shipped
Item Out
Quantity Received
Example:
Entity Relationship Diagram for Music CD Information
Deliverables:
Apply each normalization rule in order (1 to 3) to reach the 3rd Normal form.
Apply first normal form rules and provide result as 1st normal form. Provide a brief description of what was applied to reach 1st normal form as well as the model in 1st normal form.
Apply second normal form rules and provide result as 2nd normal form. Provide a brief description of what was applied to reach 2nd normal form as well as the model in 2nd normal form.
Apply third normal form and provide result as 3rd normal form. Provide a brief description of what was applied to reach 3rd normal form as well as the model in 3rd normal form.
Submit your Entity Relationship Models (1st thru 3rd normal form) as Visio, Word or image files to Canvas

Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!

Dear Students,

Embarking on the task of normalizing the Inventory Order model to the Third Normal Form (3NF) and creating corresponding Entity Relationship Diagrams (ERDs) can seem daunting. However, by following a structured approach, you can systematically achieve the desired outcomes. Below is a step-by-step guide to assist you through this process.

Step 1: Understand the Inventory Order Model

Begin by familiarizing yourself with the provided data entity attributes for the Inventory Order:

  • Order Number (identifier)
  • Order Date
  • Customer Name
  • Street Address
  • City
  • State
  • Zip
  • Customer Type
  • Initials
  • District Number
  • Region Number
  • Items (1 to 22 occurrences of):
    • Item Name
    • Quantity Ordered
    • Item Unit
    • Quantity Shipped
    • Item Out
    • Quantity Received

Step 2: Apply First Normal Form (1NF)

Objective: Ensure that the table has only atomic (indivisible) values and each entry in a column is of the same data type.

Actions:

  • Eliminate Repeating Groups: Since an order can contain multiple items (1 to 22 occurrences), separate these items into individual rows. This process involves creating a new table to handle the multiple items per order.

Resulting 1NF Structure:

  • Inventory Order Table:
    • Order Number (Primary Key)
    • Order Date
    • Customer Name
    • Street Address
    • City
    • State
    • Zip
    • Customer Type
    • Initials
    • District Number
    • Region Number
  • Order Items Table:
    • Order Number (Foreign Key)
    • Item Name
    • Quantity Ordered
    • Item Unit
    • Quantity Shipped
    • Item Out
    • Quantity Received

Description: By creating the “Order Items” table, we have removed repeating groups, ensuring that each field contains only atomic values.

Step 3: Apply Second Normal Form (2NF)

Objective: Remove partial dependencies; ensure that non-key attributes are fully dependent on the entire primary key.

Actions:

  • Identify Composite Keys: In the “Order Items” table, the combination of “Order Number” and “Item Name” can serve as a composite primary key.
  • Eliminate Partial Dependencies: Ensure that all non-key attributes in the “Order Items” table depend on both “Order Number” and “Item Name.”

Resulting 2NF Structure:

  • Inventory Order Table:
    • Order Number (Primary Key)
    • Order Date
    • Customer Name
    • Street Address
    • City
    • State
    • Zip
    • Customer Type
    • Initials
    • District Number
    • Region Number
  • Order Items Table:
    • Order Number (Foreign Key, part of Composite Key)
    • Item Name (Foreign Key, part of Composite Key)
    • Quantity Ordered
    • Item Unit
    • Quantity Shipped
    • Item Out
    • Quantity Received

Description: By ensuring that non-key attributes in the “Order Items” table are fully dependent on the composite primary key, we have achieved 2NF.

Step 4: Apply Third Normal Form (3NF)

Objective: Remove transitive dependencies; ensure that non-key attributes are not dependent on other non-key attributes.

Actions:

  • Identify Transitive Dependencies: In the “Inventory Order” table, attributes like “Street Address,” “City,” “State,” and “Zip” are dependent on “Customer Name,” not directly on “Order Number.”
  • Create Separate Tables: Establish a “Customer” table to store customer-related information and link it to the “Inventory Order” table using a foreign key.

Resulting 3NF Structure:

  • Customer Table:
    • Customer ID (Primary Key)
    • Customer Name
    • Street Address
    • City
    • State
    • Zip
    • Customer Type
    • Initials
    • District Number
    • Region Number
  • Inventory Order Table:
    • Order Number (Primary Key)
    • Order Date
    • Customer ID (Foreign Key)
  • Order Items Table:
    • Order Number (Foreign Key, part of Composite Key)
    • Item Name (Foreign Key, part of Composite Key)
    • Quantity Ordered
    • Item Unit
    • Quantity Shipped
    • Item Out
    • Quantity Received

Description: By creating a separate “Customer” table and linking it to the “Inventory Order” table via “Customer ID,” we have removed transitive dependencies, achieving 3NF.

Step 5: Create Entity Relationship Diagrams (ERDs)

Objective: Visually represent the relationships between the entities in your normalized database.

Actions:

  • Use Diagramming Tools: Utilize tools like Microsoft Visio, Lucidchart, or any ERD software to create your diagrams.
  • Define Entities and Relationships: Clearly depict the “Customer,” “Inventory Order,” and “Order Items” tables, illustrating primary keys, foreign keys, and the relationships between them.

Deliverables: Submit your ERDs for 1NF, 2NF, and 3NF as Visio, Word, or image files through Canvas.

By following this structured approach, you will effectively normalize the Inventory Order model to the Third Normal Form and create comprehensive ERDs that accurately represent the system’s data relationships.

Best regards,

[Your Instructor’s Name]

Sources

The Role of Artificial Intelligence in Cybersecurity: Applications, Risks, and Future Directions

prepare an eight-to-ten-page analytical summary of your research in which you identify and discuss the role of AI in Cybersecurity. Your summary should address the following:
The NIST Artificial Intelligence Resource Center (AIRC) supports the development and deployment of trustworthy and responsible AI technologies. This site provides an excellent set of resources for providing guardrails for AI development and deployment.
A descriiption of current uses of AI across the government and other sectors. Include specific use cases for cybersecurity.
Describe the strengths, weaknesses, opportunities and threats (SWOT) for using AI in general and specifically for cybersecurity.

Discuss and make specific recommendations on how you could apply the AI RMF framework and associated playbook to AI applications you are considering or might consider in the future to be implemented.
Summarize you paper in a short conclusion section.
Provide all associated references using APA style

Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!

This assignment is focused on analyzing and discussing the role of Artificial Intelligence (AI) in cybersecurity. Here’s how you can structure your eight-to-ten-page analytical summary to cover all the essential aspects in an organized and coherent manner:

Step 1: Introduction to AI and Cybersecurity

In this section, provide a brief overview of AI and its increasing significance in the field of cybersecurity. Mention the growing reliance on AI technologies across various sectors, particularly in protecting digital infrastructure. Set the tone for your paper by emphasizing the importance of AI in enhancing cybersecurity defenses.

Example introduction: “Artificial Intelligence (AI) has rapidly transformed the landscape of cybersecurity. As the frequency and sophistication of cyber threats grow, AI technologies are increasingly being implemented to defend against malicious actors, predict vulnerabilities, and automate threat detection. By leveraging machine learning algorithms and data analytics, AI is shaping the future of cybersecurity, making it an essential tool for governments, organizations, and other sectors.”


Step 2: The NIST Artificial Intelligence Resource Center (AIRC) and Its Role

Start this section by introducing the National Institute of Standards and Technology (NIST) AI Resource Center (AIRC). Explain its goals in ensuring trustworthy, responsible, and ethical AI development. Discuss how NIST provides guidelines for the safe implementation of AI, especially in high-risk areas like cybersecurity. Highlight its role in providing best practices and resources for the development and deployment of AI.

  • Overview of NIST AIRC: Provide an overview of the NIST Artificial Intelligence Resource Center and its mission.
  • Trustworthy and Responsible AI: Describe how NIST AIRC guides organizations in developing AI systems that are trustworthy, fair, and accountable, particularly in security applications.

Example: “The NIST AI Resource Center (AIRC) plays a critical role in promoting trustworthy and ethical AI technologies, particularly for sectors dealing with sensitive data, such as cybersecurity. Through its guidelines and resources, NIST ensures that AI technologies deployed in the field are safe, accountable, and do not introduce unintended risks.”


Step 3: Current Uses of AI in Government and Other Sectors

In this section, explore the current applications of AI in both the government and the private sector. Focus on how AI is used for cybersecurity purposes, providing specific use cases and examples of AI systems that address various security challenges.

  • AI in the Government: Explain how government agencies, such as Homeland Security, FBI, or Department of Defense, employ AI for national security and cybersecurity purposes.
  • Private Sector AI in Cybersecurity: Discuss AI use in industries such as finance, healthcare, and technology. Explain how businesses leverage AI for threat detection, risk management, and cybersecurity automation.

Example: “In the government sector, AI technologies are employed for a wide range of cybersecurity tasks, including threat detection, anomaly detection, and risk mitigation. For instance, the Department of Homeland Security uses machine learning algorithms to identify cyber threats in real-time, while the private sector is leveraging AI-driven cybersecurity platforms to predict and prevent data breaches before they occur.”


Step 4: Strengths, Weaknesses, Opportunities, and Threats (SWOT) for AI in Cybersecurity

In this section, conduct a SWOT analysis to evaluate the strengths, weaknesses, opportunities, and threats associated with AI in the context of cybersecurity.

  1. Strengths: Identify and discuss the key advantages of using AI in cybersecurity.
    • Real-time threat detection
    • Automation of repetitive tasks
    • Predictive analytics
  2. Weaknesses: Discuss the challenges or limitations of applying AI in cybersecurity.
    • Data privacy concerns
    • Reliability issues
    • Over-reliance on AI systems
  3. Opportunities: Examine potential future applications and innovations for AI in cybersecurity.
    • Advanced AI for autonomous security
    • Integration with IoT devices
    • AI-driven risk assessment tools
  4. Threats: Analyze the risks associated with the adoption of AI in cybersecurity.
    • AI adversaries and attacks
    • Bias in AI models
    • Lack of transparency in decision-making

Example: “AI’s strengths in cybersecurity lie in its ability to automate threat detection and analysis, significantly improving the speed and accuracy of responses. However, challenges such as data privacy and the potential for adversarial AI attacks present ongoing threats to the safe deployment of AI-driven security systems.”


Step 5: Recommendations for Applying the AI RMF Framework in Cybersecurity

Introduce the AI Risk Management Framework (AI RMF), which provides a set of guidelines for managing the risks associated with AI technologies. Discuss how you would apply the AI RMF framework to specific cybersecurity applications.

  1. Overview of AI RMF: Provide a brief explanation of the AI RMF framework and its importance in managing AI-related risks.
  2. Application to Cybersecurity: Offer recommendations for applying the AI RMF framework in cybersecurity. Discuss how the framework’s principles, such as trustworthiness, transparency, and accountability, can be used to mitigate risks in AI cybersecurity systems.

Example: “The AI RMF framework provides a structured approach to managing AI risks by ensuring that AI systems are transparent, accountable, and aligned with ethical standards. For cybersecurity applications, organizations can use the framework to assess potential risks and ensure that AI-driven security systems maintain high levels of reliability and fairness.”


Step 6: Future Considerations for AI in Cybersecurity

In this section, reflect on the future potential of AI in cybersecurity. Discuss emerging trends in AI technologies that could shape the future of digital security. Consider how AI will evolve and integrate with other advanced technologies like blockchain, 5G, or the Internet of Things (IoT).

  • AI and Automation: The increasing role of AI in automating routine cybersecurity tasks.
  • AI for Autonomous Security: Explore the potential for fully autonomous cybersecurity systems powered by AI.
  • AI Integration with Other Technologies: Discuss how AI will work with blockchain and IoT to enhance overall security.

Example: “Looking ahead, AI will likely continue to advance in the field of cybersecurity, moving toward fully autonomous security systems capable of detecting and mitigating threats in real-time without human intervention. Additionally, AI’s integration with technologies like blockchain and IoT will play a pivotal role in securing interconnected devices.”


Step 7: Conclusion

Summarize the key points discussed throughout the paper. Emphasize the importance of AI in cybersecurity, and reiterate the potential benefits and challenges that organizations face in adopting AI for security purposes. Conclude with final thoughts on the future of AI in cybersecurity and the need for ongoing research and development.

Example conclusion: “Artificial Intelligence is undeniably transforming the landscape of cybersecurity by providing faster, more accurate, and automated solutions to combat cyber threats. While challenges remain, particularly in ensuring transparency and managing AI risks, the future of AI in cybersecurity holds immense promise for enhancing digital security across sectors. It is essential for organizations to adopt frameworks like AI RMF to ensure that AI technologies are deployed responsibly and ethically.”


Step 8: References

Make sure to include all the sources you referenced throughout the paper, ensuring proper citation format (e.g., APA, MLA, or Chicago Style).

By following this structured approach, you’ll be able to write a comprehensive and well-organized analytical summary that covers all aspects of AI’s role in cybersecurity, as required in your assignment.

Develop elements of a Cyber Security Awareness Plan for an organization.

Develop elements of a Cyber Security Awareness Plan for an organization. This can be either for building a new security awareness program or for improving an existing one. Base this Security Awareness Plan on an organization you currently work for, or one you have worked for in the past. Anonymizing the organization is fine and has no impact on your grade. Our goal is for you to create a plan that your organization can actually use. Another option is to create a Security Awareness Plan for an organization you are familiar with and that could benefit from your assignment, perhaps your local church, kid’s club, or school system.
The assignment should be in 12-point font, about 5-7 pages. We recommend submitting a draft of your assignment to the writing specialist before turning in the final assignment, though this is not required. When you receive feedback from the writing specialist, address the suggested edits, making sure to review and delete all comments before uploading the final version for grading.
Assume the person who is reading your Security Awareness Plan is a business leader, someone who is non-technical and most likely does not know what a Security Awareness Program is or how it benefits their organization. In some cases they may not fully understand the concepts and value of cybersecurity in general. In addition, providing a title page and table of contents can help, just as you would for a full plan.
Your Security Awareness Plan should should be uploaded as a single document (Word or PDF) and include the following sections in this order:
README
Please provide a simple README at the very beginning of your plan, explaining the following points:
The organization you picked.
Why you picked it.
The industry it is in.
How many employees (must have 25 people or more).
If the program is global
Are you building a new program or improves an existing one.
The README is not part of your grade but helps us better understand the context of your project plan.
Project Plan
A fully detailed program plan for an enterprise deployment could easily be 20-30 pages. Such a comprehensive document would be excessive for this class, so instead, we ask you to submit the parts of the plan we feel are the most important and students benefit from the most (listed below).
We encourage you to leverage the examples in your class Lab Workbook and the class Digital Download Package. Remember you are developing these plans for business leaders. This means the person reading your plan may not be technical and may not know or understand what an awareness program is. Your Project Plan section needs to include the following subsections in this order:
Executive Summary (1 page)
This section aims to provide leadership with a high-level overview of your plan.
Engagement / Training Strategies (2-3 pages)
The section should describe your program’s overall engagement and training strategy.
Metrics (1-2 pages)
Why will you collect metrics, and how will they be used strategically? What was your process in selecting the metrics? Why these metrics and not others?
Learning Objectives (1 page)
Select a key human risk your organization needs to manage and create a Learning Objectives document for that specific risk.

Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!

Step-by-Step Guide to Writing Your Security Awareness Plan

Step 1: Understand the Assignment Requirements

Before you start writing, carefully review the instructions. Your assignment should:

  • Be 5-7 pages long in 12-point font.
  • Be written for business leaders who are non-technical.
  • Include a README section and a structured Project Plan.
  • Follow a clear sequence of sections: README, Executive Summary, Engagement/Training Strategies, Metrics, and Learning Objectives.

Step 2: Draft Your README Section (Not Graded, but Required)

The README section provides context for your Security Awareness Plan. Answer the following questions:

  • What organization did you pick? (Anonymizing is fine.)
  • Why did you choose this organization?
  • What industry is it in?
  • How many employees are there? (Must have at least 25 employees.)
  • Is the program global?
  • Are you creating a new program or improving an existing one?

Step 3: Write the Executive Summary (1 Page)

This section gives leadership a high-level overview of your plan. Include:

  • Purpose: Why is this plan necessary?
  • Scope: What does the plan cover?
  • Key Benefits: How will this plan help the organization?
  • Brief Overview: Summarize the main components.

Step 4: Develop Engagement & Training Strategies (2-3 Pages)

Describe how the organization will engage employees and provide training.

  • Awareness Campaigns: How will you educate employees about cybersecurity risks?
  • Training Methods: Online courses, in-person workshops, phishing simulations, newsletters, etc.
  • Target Audience: Will all employees receive the same training, or will it vary based on roles?
  • Implementation Timeline: How and when will training be rolled out?

Step 5: Define Metrics (1-2 Pages)

Explain how you will measure the success of the Security Awareness Plan.

  • What metrics will you collect? Examples: phishing test pass rates, policy compliance rates, number of reported security incidents.
  • Why these metrics? Justify their selection.
  • How will the data be used? Show how the organization will adjust strategies based on the results.

Step 6: Establish Learning Objectives (1 Page)

Choose a key human risk (e.g., phishing attacks, weak passwords, social engineering) and outline learning objectives:

  • What should employees know?
  • What behaviors should they adopt?
  • How will success be measured?

Step 7: Format and Finalize Your Document

  • Include a Title Page and Table of Contents.
  • Ensure clear headings and subheadings for readability.
  • Submit as a single Word or PDF file.
  • If possible, submit a draft to the writing specialist for feedback.
  • Review feedback, make edits, and delete comments before submitting.

By following this structured approach, you will create a well-organized and effective Security Awareness Plan that meets all assignment requirements!

Designing a Maned Wolf Habitat in Tinkercad: A Step-by-Step Guide

making a maned wolf habitat in a zoo in tinkercad with barriers, holding area for zookeepers and lots of rocks and as much as their natural habitat as possible.

Struggling with where to start this assignment? Follow this guide to tackle your assignment easily!

Step 1: Research the Natural Habitat of Maned Wolves

  • Natural Habitat: Maned wolves are native to the grasslands and scrub forests of South America, particularly in Brazil. Their environment includes open spaces, tall grasses, scattered trees, and rocks.
  • Needs: They require space for roaming, hiding spots for rest, and areas for enrichment activities like foraging.

Step 2: Plan the Layout

  1. Enclosure Size:
    • Use Tinkercad’s measurement tools to create a spacious enclosure (e.g., 50m x 30m or larger).
    • Include open space for movement and smaller areas with vegetation for hiding.
  2. Sections to Include:
    • Public Viewing Area: Position one or two sides for public viewing with sturdy barriers (e.g., glass walls or fences).
    • Zookeeper Holding Area: Add a secure structure or holding pen for feeding, medical care, and other zookeeper tasks.
    • Habitat Features: Incorporate rocks, grass patches, shrubs, and a small water source (e.g., a pond).

Step 3: Create Barriers

  1. Primary Barrier:
    • Use clear panels (glass) or high mesh fencing for public-facing sides.
    • Design the fence to be tall enough (at least 2.5–3 meters) to prevent escapes.
  2. Secondary Barrier:
    • Add a backup perimeter fence or natural barriers like dense bushes around the enclosure to ensure double safety.

Step 4: Design the Zookeeper Holding Area

  1. Structure:
    • Create a small, enclosed building or pen near one corner of the habitat.
    • Add two doors: one leading outside the habitat and another opening into the enclosure.
  2. Features:
    • Inside, add storage shelves for tools and food containers.
    • Include a small isolation area for when animals need to be separated for medical reasons.

Step 5: Add Habitat Elements

  1. Vegetation:
    • Place clusters of tall grasses, shrubs, and small trees.
    • Leave open patches of ground for roaming and running.
  2. Rocks:
    • Scatter rocks of various sizes around the habitat for resting spots and aesthetic appeal.
  3. Water Source:
    • Add a small pond or stream in one corner. Surround it with rocks and vegetation.
  4. Shelter:
    • Include a small cave or shaded area for the maned wolf to rest during hot weather.

Step 6: Enrichment Features

  • Add logs, raised platforms, and hidden compartments to encourage natural foraging behavior.
  • Include trails or paths with different textures like sand, dirt, and grass.

Step 7: Fine-Tune the Design

  • Zookeeper Accessibility: Ensure pathways are clear and zookeeper holding areas are easily accessible.
  • Public Viewing: Add viewing windows or platforms that align with the maned wolf’s active areas to enhance the visitor experience.

Step 8: Test in Tinkercad

  • Preview your design and adjust proportions to ensure it looks natural and functional.
  • Add labels for the barriers, holding area, and key habitat features.

Once complete, your habitat will mimic the grassland environment of South America while providing safety, comfort, and enrichment for the maned wolf and a great viewing experience for zoo visitors!

The individual CTF challenge is made up of 100 challenges separated into 10 cate

The individual CTF challenge is made up of 100 challenges separated into 10 categories of 10 challenges. You may choose which challenges you want to attempt and may attempt multiple challenges from the same category. Once you have attempted any of the 10 questions out of the 100 proceed to the CTF Challenge Write-Up.
Review the Capture the Flag Challenges and pick 10 to solve. You can check your answers with the “CTF Answer Checker” in the quizzes section of the course.
When you have attempted 10 challenges, follow the instructions in the Capture the Flag (CTF) Write-Up Template to answer follow-up questions on your CTF experience. You will submit your write-up to the assignments folder in Week 3.

The individual CTF challenge is made up of 100 challenges separated into 10 cate

The individual CTF challenge is made up of 100 challenges separated into 10 categories of 10 challenges. You may choose which challenges you want to attempt and may attempt multiple challenges from the same category. Once you have attempted any of the 10 questions out of the 100 proceed to the CTF Challenge Write-Up.
Review the Capture the Flag Challenges and pick 10 to solve. You can check your answers with the “CTF Answer Checker” in the quizzes section of the course.
When you have attempted 10 challenges, follow the instructions in the Capture the Flag (CTF) Write-Up Template to answer follow-up questions on your CTF experience. You will submit your write-up to the assignments folder in Week 3.

-to improve the efficiency and structure of the paper. -refining the methodology

-to improve the efficiency and structure of the paper. -refining the methodology, results, and conclusion to emphasize novelty, clarity, and alignment with high-impact journals or top-tier conferences. -enhance/include comparative analysis, strengthen the paper’s practical implications, and improve the overall technical rigor and presentation for better acceptance chances. -Evaluate the models used in terms of efficiency and predictive performance -include another benchmark(relevant e.g. Lorenz data, Numenta Anomaly Benchmark (NAB), Mackey-Glass Time Series ) dataset and choose the optimised values for the hyperparameter/parameters if used any.

1. Title Page: • Research title, full name, department, and date. 2. Abstract (1

1. Title Page:
• Research title, full name, department, and date.
2. Abstract (1 Page):
• One paragraph summary (problem, objectives, methods, findings).
3. Table of Contents:
• List sections with page numbers.
4. List of Tables/Figures:
• Include titles and page numbers.
5. Chapter 1 – Introduction:
• Background: Why the problem matters.
• Problem Statement: What’s unknown/problematic.
• Purpose: Goal of the study.
• Objectives: Clear and concise.
• Research Questions/Hypothesis: Direct and simple.
• Scope: Define research boundaries.
• Significance: Contribution to knowledge.
• Definitions: Key terms used.
6. Chapter 2 – Literature Review:
• Summarize past research.
• Identify gaps.
• Explain relevant theories (Theoretical Framework).
• Link to your study.
7. Chapter 3 – Methodology:
• Design: Research method (qualitative/quantitative).
• Sample/Population: Who you will study.
• Tools: Instruments (surveys, tests, etc.).
• Data Collection: How data is gathered.
• Analysis: How data will be interpreted.
8. Chapter 4 – Expected Results:
• Predict outcomes linked to research questions.
9. Chapter 5 – Milestones/Timeline:
• Key steps (proposal, data collection, analysis).
• Project completion timeline.
10. Chapter 6 – Conclusion:
• Summarize key points of the proposal.
11. References:
• Use Harvard referencing style.
12. Appendices:
• Attach surveys, additional materials.

Prepare a 8-10 page double-spaced (not including title or reference pages) resea

Prepare a 8-10 page double-spaced (not including title or reference pages) research paper based on the topics above or similar topic in the text or something covered in this class. Paper organization will include: Introduction Clearly define the problem, issue, or desired topic that was researched. Starts out broad and becomes more and more specific. Body Present the relevant literature and ideas. Identify relations, contradictions, gaps, and inconsistencies in the literature. Possible solutions to any problem(s) identified. Conclusion References (at least ten). Instructions: An in-depth submission that is free of spelling and grammar errors in APA format. Double-spaced format (APA) with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor). 12-point font, Times New Roman styles. Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances Important: Good academic writing requires writers to cite the sources of all facts in text. If you state that the sky is blue then you must cite who said it. A good rule of thumb is one citation per paragraph; paragraphs 3-5 sentences (This is how to avoid unintentional plagiarism). Papers are always written in third person past tense as you are writing about events in the past from the point of view of an observer. The student or writer proposed; One must observe.