One of the main objectives of this course is to help you gain hands-on experienc

One of the main objectives of this course is to help you gain hands-on experience in communicating insightful and impactful findings to stakeholders. In this project you will use the tools and techniques you learned throughout this course to train a few classification models on a data set that you feel passionate about, select the regression that best suits your needs, and communicate insights you found from your modeling exercise.
Step by Step Assignment Instructions
Setup instructions:
Before you begin, you will need to choose a data set that you feel passionate about. You can brainstorm with your peers about great public data sets using the discussion board in this module.
Please also make sure that you can print your report into a pdf file.
How to submit:
The format of your work must adhere to the following guidelines. The report should be submitted as a pdf. Optionally, you can include a python notebook with code.
Make sure to include mainly insights and findings on your report. There is no need to include code, unless you want to.
Project
Optional: find your own data set
As a suggested first step, spend some time finding a data set that you are really passionate about. This can be a data set similar to the data you have available at work or data you have always wanted to analyze. For some people this will be sports data sets, while some other folks prefer to focus on data from a datathon or data for good.
Optional: participate in a discussion board
As an optional step, go into a discussion board and brainstorm with your peers great data sets to analyze. If you prefer to skip this step, feel free to use the Ames housing data set or the Churn phone data set that we used throughout the course.
Required
Once you have selected a data set, you will produce the deliverables listed below and submit them to one of your peers for review. Treat this exercise as an opportunity to produce analysis that are ready to highlight your analytical skills for a senior audience, for example, the Chief Data Officer, or the Head of Analytics at your company.
Sections required in your report:
Main objective of the analysis that specifies whether your model will be focused on prediction or interpretation and the benefits that your analysis provides to the business or stakeholders of this data.
Brief description of the data set you chose, a summary of its attributes, and an outline of what you are trying to accomplish with this analysis.
Brief summary of data exploration and actions taken for data cleaning and feature engineering.
Summary of training at least three different classifier models, preferably of different nature in explainability and predictability. For example, you can start with a simple logistic regression as a baseline, adding other models or ensemble models. Preferably, all your models use the same training and test splits, or the same cross-validation method.
A paragraph explaining which of your classifier models you recommend as a final model that best fits your needs in terms of accuracy and explainability.
Summary Key Findings and Insights, which walks your reader through the main drivers of your model and insights from your data derived from your classifier model.
Suggestions for next steps in analyzing this data, which may include suggesting revisiting this model after adding specific data features that may help you achieve a better explanation or a better prediction.
After going through some guided steps, you will have insights that either explain or predict your outcome variable. As a main deliverable, you will submit a report that helps you focus on highlighting your analytical skills and thought process.
Grading Criteria Overview
Your peer will review your report from the perspective of a Chief Data Officer or the Head of Analytics and will assess whether your final linear regression went through all the necessary steps to achieve the main objective of your analysis.
Yes, you are expected to leverage a wide variety of tools, but this report should focus on presenting findings, insights, and next steps. You may include some visuals from your code output, but this report is intended as a summary of your findings, not a code review. Optionally, you can submit your code as a python notebook or as a print out in the appendix of your document.
The grading will center around 5 main points:
Does the report include a section describing the data?
Does the report include a paragraph detailing the main objective(s) of this analysis?
Does the report include a section with variations of classifier models and specifies which one is the model that best suits the main objective(s) of this analysis?
Does the report include a clear and well presented section with key findings related to the main objective(s) of the analysis?
Does the report highlight possible flaws in the model and a plan of action to revisit this analysis with additional data or different predictive modeling techniques?
Frequently Asked Questions
Here are frequently asked questions about the assignment and review process. Please read these before starting your assignment.
Do I have to come up with my own data set?
You are highly encouraged to find a data set you feel really passionate about. This will help you showcase analytical work that truly matches your skills. But if you prefer, you can use some of the data sets from this course.
Is it OK to choose the same data set as someone else?
Yes, more than one person can analyze the same data set. Most likely your insights will be different from your peers and you will still be able to showcase your own talent as a unique solution.
Do I have to train more than 3 different classifiers?
It is highly recommended that you try at least three different classifiers to highlight which tool or technique improved your prediction or interpretation.
Is this an individual assignment?
You can ask for help or assistance on technical issues and general direction of your analysis, but the interpretation of the analytical output and the writing of the report should be your own.
Comments from Customer
Discipline: AI

One of the main objectives of this course is to help you gain hands-on experienc

One of the main objectives of this course is to help you gain hands-on experience in communicating insightful and impactful findings to stakeholders. In this project you will use the tools and techniques you learned throughout this course to train a few classification models on a data set that you feel passionate about, select the regression that best suits your needs, and communicate insights you found from your modeling exercise.
Step by Step Assignment Instructions
Setup instructions:
Before you begin, you will need to choose a data set that you feel passionate about. You can brainstorm with your peers about great public data sets using the discussion board in this module.
Please also make sure that you can print your report into a pdf file.
How to submit:
The format of your work must adhere to the following guidelines. The report should be submitted as a pdf. Optionally, you can include a python notebook with code.
Make sure to include mainly insights and findings on your report. There is no need to include code, unless you want to.
Project
Optional: find your own data set
As a suggested first step, spend some time finding a data set that you are really passionate about. This can be a data set similar to the data you have available at work or data you have always wanted to analyze. For some people this will be sports data sets, while some other folks prefer to focus on data from a datathon or data for good.
Optional: participate in a discussion board
As an optional step, go into a discussion board and brainstorm with your peers great data sets to analyze. If you prefer to skip this step, feel free to use the Ames housing data set or the Churn phone data set that we used throughout the course.
Required
Once you have selected a data set, you will produce the deliverables listed below and submit them to one of your peers for review. Treat this exercise as an opportunity to produce analysis that are ready to highlight your analytical skills for a senior audience, for example, the Chief Data Officer, or the Head of Analytics at your company.
Sections required in your report:
Main objective of the analysis that specifies whether your model will be focused on prediction or interpretation and the benefits that your analysis provides to the business or stakeholders of this data.
Brief description of the data set you chose, a summary of its attributes, and an outline of what you are trying to accomplish with this analysis.
Brief summary of data exploration and actions taken for data cleaning and feature engineering.
Summary of training at least three different classifier models, preferably of different nature in explainability and predictability. For example, you can start with a simple logistic regression as a baseline, adding other models or ensemble models. Preferably, all your models use the same training and test splits, or the same cross-validation method.
A paragraph explaining which of your classifier models you recommend as a final model that best fits your needs in terms of accuracy and explainability.
Summary Key Findings and Insights, which walks your reader through the main drivers of your model and insights from your data derived from your classifier model.
Suggestions for next steps in analyzing this data, which may include suggesting revisiting this model after adding specific data features that may help you achieve a better explanation or a better prediction.
After going through some guided steps, you will have insights that either explain or predict your outcome variable. As a main deliverable, you will submit a report that helps you focus on highlighting your analytical skills and thought process.
Grading Criteria Overview
Your peer will review your report from the perspective of a Chief Data Officer or the Head of Analytics and will assess whether your final linear regression went through all the necessary steps to achieve the main objective of your analysis.
Yes, you are expected to leverage a wide variety of tools, but this report should focus on presenting findings, insights, and next steps. You may include some visuals from your code output, but this report is intended as a summary of your findings, not a code review. Optionally, you can submit your code as a python notebook or as a print out in the appendix of your document.
The grading will center around 5 main points:
Does the report include a section describing the data?
Does the report include a paragraph detailing the main objective(s) of this analysis?
Does the report include a section with variations of classifier models and specifies which one is the model that best suits the main objective(s) of this analysis?
Does the report include a clear and well presented section with key findings related to the main objective(s) of the analysis?
Does the report highlight possible flaws in the model and a plan of action to revisit this analysis with additional data or different predictive modeling techniques?
Frequently Asked Questions
Here are frequently asked questions about the assignment and review process. Please read these before starting your assignment.
Do I have to come up with my own data set?
You are highly encouraged to find a data set you feel really passionate about. This will help you showcase analytical work that truly matches your skills. But if you prefer, you can use some of the data sets from this course.
Is it OK to choose the same data set as someone else?
Yes, more than one person can analyze the same data set. Most likely your insights will be different from your peers and you will still be able to showcase your own talent as a unique solution.
Do I have to train more than 3 different classifiers?
It is highly recommended that you try at least three different classifiers to highlight which tool or technique improved your prediction or interpretation.
Is this an individual assignment?
You can ask for help or assistance on technical issues and general direction of your analysis, but the interpretation of the analytical output and the writing of the report should be your own.
Comments from Customer
Discipline: AI

Before beginning work on this interactive assignment, review Chapter 10 in the t

Before beginning work on this interactive assignment, review Chapter 10 in the textbook, and review any relevant information in this week’s lecture. Access the MISM Credible Resource Guide for assistance with finding additional sources and information on this topic. For this interactive assignment access your virtual lab environment and follow the instructions provided within the lab.
As a network administrator of a company, you are faced with many networking problems that occur on a daily basis. Having an arsenal of tools and the knowledge to use them as part of your troubleshooting effort is critical. The following are common network troubleshooting commands. Be aware that many of these have useful switches that expand the command’s capabilities.
IPConfig
Tracert
Ping
Nslookup
GetMac
Netstat
Tasklist
Taskkill
Netsh
Netuse
Dnslookup
Arp
Route
Shutdown
Within your virtual lab environment you will follow the instructions provided. In the virtual lab, create a PDF with a screenshot of each complete step of the instructions. (Be sure to include two screenshots per page in your PDF.) Once you have completed the exercise within the virtual lab, download the PDF and attach it to your initial post.
In the body of your initial post, provide an explanation of each command. Using what you completed in the virtual lab, provide examples or use scenarios that demonstrate where or how each of the commands can be used when troubleshooting network problems.
the software. If the e-mail is heading out onto the Internet, the transport layeradds a TCP header to the front of the e-mail message. The information in thisheader is used by the TCP layer at the receiving workstation to perform one ormore of the six transport functions. The TCP header contains the fields shownin Figure 10-7. Let us examine only those fields that assist TCP in performingthe six functions listed earlier.Figure10-7The fields of theTCP headerSource PortDestination PortSequence Number16 bits16 bits32 bitsAcknowledgment NumberHlenFlagsWindow32 bits4 bits16 bitsChecksumUrgent PointerOptionalVariable LengthData . . . . . . . . . .Variable LengthReserved6 bits6 bitsOptionsPadding16 bits16 bitsThe first two TCP header fields, Source Port and Destination Port, containthe addresses of the application programs at the two ends of the transport connection. These port addresses are used in creating and terminating connections.The port number can also be used to multiplex multiple transport connection sover a single IP connection. It is important to note the difference between an IP address and a port number. The IP address identifies a device connected to the Internet, while the port number identifies an application on that device. Working together, the two create what is called a socket—a precise identification of a particular application on a particular device. What if your company has one server that handles both e-mail and FTP connections? The server would have one IP address but two different port numbers: one for the e-mail application and one for the FTP application. Now let us add the fact that this server is more than likely on a local area network, and thus has a network interface card (NIC) with a unique 48-bit NIC address. Now we have three addresses. The NIC address is used only on the local area network to find a particular device. The IP address is used to move the data packet through the Internet. The port number is used to identify the particular application on a device. The Sequence Number field contains a 32-bit value that counts bytes and indicates a packet’s data position within the connection. For example, if you are in the middle of a long connection in which thousands of bytes are being transferred, the Sequence Number tells you the exact position of this packet within that sequence. This field can be used to reassemble the pieces at the receiving workstation and determine if any packets of data are missing. The Window field contains a sliding window value that provides flow control between the two endpoints. If one end of the connection wants the other end of the connection to stop sending data, the Window field can be set to 0. The Checksum field is the next, and it provides an arithmetic check-sum of the header and the data field that follows the header. The Urgent Pointer is used to inform the receiving workstation that this packet of data contains urgent data. Like its counterpart IP, TCP is a fairly streamlined protocol. Its primary goal is to create an error-free, end-to-end connection across one or more networks. TCP and IP do have their shortcomings, however, and these have The Internet281Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Du
chapter10
the software. If the e-mail is heading out onto the Internet, the transport layeradds a TCP header to the front of the e-mail message. The information in thisheader is used by the TCP layer at the receiving workstation to perform one ormore of the six transport functions. The TCP header contains the fields shownin Figure 10-7. Let us examine only those fields that assist TCP in performingthe six functions listed earlier.Figure10-7The fields of theTCP headerSource PortDestination PortSequence Number16 bits16 bits32 bitsAcknowledgment NumberHlenFlagsWindow32 bits4 bits16 bitsChecksumUrgent PointerOptionalVariable LengthData . . . . . . . . . .Variable LengthReserved6 bits6 bitsOptionsPadding16 bits16 bitsThe first two TCP header fields, Source Port and Destination Port, containthe addresses of the application programs at the two ends of the transport con-nection. These port addresses are used in creating and terminating connections.The port number can also be used to multiplex multiple transport connectionsover a single IP connection.It is important to note the difference between an IP address and a port num-ber. The IP address identifies a device connected to the Internet, while the portnumber identifies an application on that device. Working together, the two cre-ate what is called asocket—a precise identification of a particular applicationon a particular device. What if your company has one server that handles bothe-mail and FTP connections? The server would have one IP address but two dif-ferent port numbers: one for the e-mail application and one for the FTP applica-tion. Now let us add the fact that this server is more than likely on a local areanetwork, and thus has a network interface card (NIC) with a unique 48-bit NICaddress. Now we have three addresses. The NIC address is used only on thelocal area network to find a particular device. The IP address is used to movethe data packet through the Internet. The port number is used to identify theparticular application on a device.The Sequence Number field contains a 32-bit value that counts bytes andindicates a packet’s data position within the connection. For example, if youare in the middle of a long connection in which thousands of bytes are beingtransferred, the Sequence Number tells you the exact position of this packetwithin that sequence. This field can be used to reassemble the pieces at thereceiving workstation and determine if any packets of data are missing.The Window field contains a sliding window value that provides flow con-trol between the two endpoints. If one end of the connection wants the otherend of the connection to stop sending data, the Window field can be set to 0.The Checksum field is the next field, and it provides for an arithmetic check-sum of the headerandthe data field that follows the header. The UrgentPointer is used to inform the receiving workstation that this packet of datacontains urgent data.Like its counterpart IP, TCP is a fairly streamlined protocol. Its primarygoal is to create an error-free, end-to-end connection across one or morenetworks. TCP and IP do have their shortcomings, however, and these haveThe Internet281Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Du

The purpose of this assignment is to give you the opportunity to develop and pra

The purpose of this assignment is to give you the opportunity to develop and practice the
type of 21st century skills that are critically important for IT professionals in the workplace.
These skills include critical thinking, problem solving, communication, teamwork, and
lifelong learning.
Comments from Customer
Discipline: IT in Global/Local Cultures

This assignment is to demonstrate your capability to write Python Program by cal

This assignment is to demonstrate your capability to write Python Program by calculating
Grading for the class.
Hi, Class,
This is our Term Project – Signature Assignment
Data file is in Class Content Area
This assignment is to ask you to write a Python program conduct Grading for the class -1.
Input Read the input score data from an external file given by Dr. Liu
This data file is arranged as following format (colon as delimeter)
Name. : ID : (Test1-Score) : (Test2- Score) : (HW- Score) : (Project-Score)
The percentage for semester is as following:
Test1 – 20%
Test2 – 20%
HW – 40%
Project – 20%
Processing: Computation
The total semester score = 20% * Test1 + 20% * Test2 + 40% * HW + 20% * Project
Once the total semester score is computed, use this number to determine the
Semester Grade by the following Rubric:
Total_Score > = 90. The Grade will be A
90 > Total_Score > = 80. The Grade will be B
80> Total_Score > = 70. The Grade will be C
70> Total_Score > = 60. The Grade will be D
60> Total_Score The Grade will be F
Output:
After all these steps, your program will print out the output into an External File – the Format will be like the following:
For example:
Name. ID. (Test1) (Test2) (HW) (Project) TotalScore Grade
Peter Pan. 01 80 80 80 80 80 B
Then repeat for another student until all data in the given data file is done.
Comments from Customer
Discipline: Programming of All

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is one of the analytical inspection method of usability . 1 paragraph as introduction, 1 paragraph as background, and 5 literature review and specify the gaps and then steps of how to apply it to evaluate software system in general. I will attach one publication to clarify my need
Comments from Customer
Discipline: Software Engineering

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is

I need to write about Cognitive Walkthroughs evaluation methods in HCI as it is one of the analytical inspection method of usability . 1 paragraph as introduction, 1 paragraph as background, and 5 literature review and specify the gaps and then steps of how to apply it to evaluate software system in general. I will attach one publication to clarify my need
Comments from Customer
Discipline: Software Engineering

1. Download the LinkedIn Worksheet Download LinkedIn Worksheet. 2. Save file wit

1. Download the LinkedIn Worksheet Download LinkedIn Worksheet.
2. Save file with the following naming protocol: LinkedIn_Worksheet_YourName.docx.
3. Complete all sections with as much detail and personal reflection as possible. This is meant to be a tool and resource to help you conduct a meaningful and effective job search. The more effort you put in, the more you can clarify your goals and expectations.
I also attach mt resume below.

Need attached documents to be turned into 1 complete document. Overview Most or

Need attached documents to be turned into 1 complete document.
Overview
Most organizations have incident response plans to assist with decision making during times of crisis. “When an incident occurs” is not the right time to focus on preventative measures or high-level strategic planning. The security practitioner needs to quickly assess, act, and improvise to stop adversaries that are already inside their organization’s network. Limiting damage and regaining operational control of the computing environment are key goals.
Above all, the plans and artifacts associated with incident response serve as a bridge from analysis to action. Good understanding of adversary tradecraft, reasonable predictions about likely avenues of attack, and clear, concise tactical response procedures help practitioners limit the negative impacts of cyberattacks. To seize the initiative, incident responders must limit their adversary’s mobility, disrupt their patterns of attack, and work to restore critical
services so that an organizations can continue to function. A practitioner must take a balanced, structured approach to developing both operational and tactical incident detection and response capabilities.
Assess how legislation, policies, and regulations shape incident detection and response practices
Employ incident detection and response tools and techniques necessary for successfully detecting, managing, and resolving incidents
Develop security countermeasures that reduce the negative impacts of incidents on organizational systems, operations, and personnel
Communicate the results of incident response activities to technical and nontechnical audiences for enhancing the security posture of an organization
Scenario
Review the full Final Project Scenario for this project. You have been tasked with providing an executive summary and plan (see below) to address the situation in the scenario.
Prompt
Your executive summary and plan must be submitted together and include the following critical elements. Most of the critical elements align with a particular course outcome (shown in brackets).
Executive Summary: Executives often rely on the executive summary of long or technical reports to give them the information they need. Your executive summary will contain an overview and a brief section on the legal, regulatory, and policy compliance issues that are of specific interest to the stakeholders.
Overview: The purpose of this summary is to highlight the main points of the report, and any findings or recommendations. Logically, you will write the overview portion of this report last. However, your final artifact will position this piece first for the audience.
Describe how the overall plan will enhance the security posture of the organization, using consumable language (i.e., no overly technical jargon or slang terms).
Discuss key takeaways (response procedures) based on the scenario, using consumable language.
Articulate how your team plans to operationalize this approach for better response to the executive stakeholders.
Legal, Regulatory, and Policy Compliance: In this section, you will discuss considerations related to the legal, regulatory, and policy compliance issues identified in the scenario. Consider some of the topics and issues you engaged with in Module One as you address this portion of your final project.
Explain how the legal and regulatory issues influence the organization’s approach to detection. Provide examples based on the scenario.
Explain how the legal and regulatory issues identified in the scenario influence the organization’s approach to response. Provide examples based on the scenario.
Explain your method for resolving gaps in resources or the processes that are necessary to address legal, regulatory, and policy compliance issues. Provide examples. For example, what specific policies are currently in place to address these elements, based on what you were provided for this project and your activities during the course?
Operational Plan and Analysis: The purpose of this section is for you to put together a plan that your team can operationalize if an incident such as the one in the scenario should occur again.
Incident Response Process With Key Roles and Responsibilities Assignments: You were provided with a diagram and table in the Milestone One document to use as the basis of this part of your project. If the table provided is too cumbersome, you may make your own. However, your completed table must contain and build on the provided information, addressing the steps within the full flow of a potential attack, as well as the key roles and responsibilities necessary for detecting and responding to the provided incident types.
Identify a logical sequence of steps stakeholders should take for addressing the scenario. For example, who should do what within the process?
Articulate the rationale behind the assignment of the roles and responsibilities for these steps. Ensure you address implementation concerns in your rationale.
Courses of Action Table: You were provided with a Courses of Action table template to use as the basis of this part of your project. Your completed courses of action table must address the full flow of a potential attack, specifically the one in your provided scenario.
Attack Methods and Features: Describe logical steps to model a potential attack from start to finish.
Detection Location and Methods: Describe potential detection location and methods for different steps in an attack pattern.
Response Objective: Identify the effects you want to achieve in countering the attack and how you want to achieve them.
Response Method: Identify response methods that are logical and feasible in addressing the nature of the attack.
Countermeasures Analysis: You have been exposed to several attack types and created your courses of action table. This section of your plan will contain a brief narrative around your thinking in creating that table and how your security countermeasures will address the nature of those attacks.
Explain how your security countermeasures will reduce the negative impacts from the attack methods on organizational systems.
Explain how your security countermeasures will reduce the negative impacts from the attack methods on organizational operations.
Explain how your security countermeasures will reduce the negative impacts from these types of attacks on your personnel (roles and resources).
Milestones
Milestone One: Incident Response Process Diagram With Key Roles and Responsibilities Annotations
In Module Three, you will submit section II.A (incident response process with key roles and responsibilities assignments) of the final project. This milestone will be graded with the Milestone One Rubric.
Milestone Two: Courses of Action Table
In Module Six, you will submit section II.B of the final project: the courses of action table. This milestone will be graded with the Milestone Two Rubric.
Milestone Three: Countermeasures Analysis
In Module Seven, you will submit section II.C of the final project: the countermeasures analysis. This milestone will be graded with the Milestone Three Rubric.
Final Submission: Executive Summary and Plan
In Module Nine, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.
Your submission should be approximately 3 pages in length, not including the completed templates (plus a cover page and references), and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least three references, which should be cited according to APA style.

3. Writing a Project Report • The project report should be about 2,000 words and

3. Writing a Project Report
• The project report should be about 2,000 words and follow the approved style guide.
• The abstract should be between 150-250 words
• The project should be in “A4” size. You should follow Times New Roman font “12” for text, “10” for footnotes, provide double spacing and a larger font for the section headings, keep the orientation of the page as portrait, and specify a margin of 1 inch on all sides.
• The pages should have consecutive numbering.
• The project must contain: