Category: Information Systems

Potential topics and titles for Journal article

 

Last week you started researching and writing annotated bibliography. As you are doing so, you are starting to think about a topic, preferably related to your dissertation expertise, to write a journal article on for publication. In this weeks discussion I would like for everyone to start sharing their potential topics and potential article titles.

You must do the following:

1) Create a new thread. As indicated above, please provide potential topics for your journal article and potential titles.

Introduction to data mining

 

1) The rule-based classification can be used to refer to any classification scheme that make use of IF-THEN rules for class prediction. Discuss the rule-based classification schemes and what is Rule Pruning in data mining?

2) Bayesian classification is based on Bayes’ Theorem. Bayesian classifiers are the statistical classifiers. Discuss what is Bayesian classification in data mining? How do Bayesian networks work? What do Bayesian networks predict?

Research Paper

  

Self-Driving Cars: Autonomous vehicles require incredible data processing capabilities and system speeds needed to mimic the timing of human reflexes. Companies like Ouster are developing light imaging, detection, and ranging applications that are the key to standard improvements like lane control and adaptive cruise control. But are also turning fully autonomous vehicles into mobile data centers, allowing driverless cars to make real-time, complex decisions. Is this a good thing? Will society ultimately benefit from these technologies? Or will this trend put hundreds of thousands of Americans out of work who drive for a living?

Format

  

Components: Each Residency Project Paper will require that several parts be submitted in whole. 

PART 1: INTRODUCTION Your team must write an introduction section that introduces your topic 500 to 800 words

PART 2: HISTORY – Your team must write a history section. How did your research topic come to be over time? When was it introduced? What social shortcoming did it resolve? Why did it become popular or trendy? 750 to 1000 words

PART 3: ADVANCEMENTS and FAILURES How did the first versions or early adopters perform? What portions of your subject did well? What failed? What aspects have been added over time? What has been eliminated? 750 to 1000 words

PART 4: FINAL CONCLUSION Do you think your subject topic will grow? Do you think it will become obsolete? Why? What do you see as the future of your topic: Do you have any other recommendations? Will it be replaced? 500 to 800 words

PART 5: Accompanying PowerPoint presentation your team will have a maximum of 20 minutes to present a PowerPoint presentation of your project. You must have a minimum of 5 slides but no more than 10 slides. The presentation should be interesting, brief, and informative – just the facts, no fluff or extra verbiage. Think of your presentation as a movie trailer. Short and to-the-point.

APA format & References Page a minimum of FIVE solid references. Your teams research paper is to be written in complete and clean APA format. Your references do NOT have to be scholarly references. They can be commercial media references, but should be from professional organizations or magazine articles. NO WIKIPEDIA.

The INTRO, HISTORY, and ADVANCEMENTS/FAILURES sections will be due throughout the course BEFORE the Residency. Your Team will collectively assemble all of the written sections, adding the Conclusion and the References Page as ONE RESEARCH PAPER for the Team and submit it on SUNDAY of the residency weekend.

Business Intelligence-Discussion

 

Data mining is a complex subject dominated by emerging technologies and privacy regulations, and consumers gained better control over their personal data when the General Data Protection Regulation became enforceable on May 25, 2018. Under GDPR, profiling is determined to be any kind of automated personal data processing that analyzes or predicts certain aspects of an individuals behavior, socioeconomic situation, movements, preferences, health and so forth.

In your initial post, describe two major impacts that GDPR has on the process and practice of data mining.

Respond substantively to at least two other students’ posts. Comment on how GDPR has changed the way in which every business stores, processes, transfers, and analyzes its data based on the impacts discussed in your classmate’s initial post.

*please remember to include at least one credible scholarly reference with your initial post!

Data Analyzing & Visualization

 

Reflect on your most recent visualisation project and try to sketch or write out the approach you took. What stages of activity did you undertake and in what sequence? Did it feel efficient or chaotic? Was it interrupted by changes, uncertainty or a sense of too much choice? Before you can seek to improve your ongoing approach it is worth unpicking what you currently do and how you do it.

Assignment Link: http://book.visualisingdata.com/chapter/chapter-2

paper

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Should be in APA format with references and citations.

Assig M

Please make sure to read, Chapter 3 The Quality of Social Simulation:An Example from Research Policy Modelling, Petra Ahrweiler and Nigel Gilbert. 
Chapter 3 discusses methods to assess the quality of simulations. You learned about three different views of simulation quality.

Suppose you lead a task force that is developing a simulation to provide strategic planning recommendations for property use zoning for a county of 750,000 residents. The zoning board and county commissioners want a simulation that allows them to assess the impact of various zoning decisions based on a variety of dynamic factors, including age, race, education, and income status. Which of the three views discussed would provide the best quality assessment for this type of simulation? How would you ensure the highest level of accuracy with your simulation, and how would you go about determining accuracy?

As indicated above, identify which of the three views discussed in the chapter that would provide the best quality assessment for the situation described above, and explain your decision. How would you ensure the highest level of accuracy with your simulation, and how would you go about determining accuracy?

Anonymous

 

The development of a database requires thorough methodology that ensures quality within the solution. Imagine you have been contracted to develop a finance database that will help an organization track monthly expenditures by departments. Using the DBLC, discuss the various activities that you would have to achieve each phase. Assess possible challenges that may exist within each phase. Suggest actions that one can perform in order to overcome these possible challenges.

In order to mitigate risks associated with a database, it is essential to consider common sources of database failures. Describe at least two possible database failures that may occur once a database is placed into operation. Suggest actions that may be performed in order to avoid or mitigate these possible failures.

Cryptography Keys

 

Cryptography provides confidentiality, integrity authentication, and nonrepudiation for sensitive information while it is stored (at rest), traveling across a network (in transit), and existing in memory (in use). Cryptography keys play in the world of data security and are an extremely important security technology embedded in many of the security controls used to protect information from unauthorized visibility and use.   
Lets say you work for one of the following types of industry: 

  • Manufacturing 
  • Government 
  • Research 
  • Service 
  • Consulting 

After you choose one of the above, consider the three types of algorithms commonly used today. Which do you find to be the most secure? Which is the most complex? Which did you struggle to understand? What do you think you need to know as a manager in order to choose the right security systems for your company?  Be sure to fully develop your responses and support your opinion with reasons from your study this week. 

CIS 524 Case Study 2

Case Study 2: Design Process

You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. 

Read the article located at http://www.bcs.org/upload/pdf/ewic_hc07_lppaper18.pdf.

 

Write a four to five (4-5) page paper in which you:

1.Suggest the prototyping technique you would use for this system and support your rationale.

2.Create a management plan containing eight to ten (8-10) stages for proper design of such a system. 

3.Explain each stage of the management plan and justify your rationale.

4.Estimate the length of time it will take to complete each stage of the management plan.

5.Compare and contrast the self-check-in interface with the interface a receptionist would use.

6.Use Microsoft Visio or an open source alternative, Dia, to create a total of two (2) graphical representations of your proposed interfaces, one (1) for the self-check-in and one (1) for the receptionist. Note: The graphically depicted solution is not included in the required page length.

7.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted. 

The specific course learning outcomes associated with this assignment are:

Analyze and evaluate interface design models.

Develop an interface design plan that addresses and solves a proposed business problem.