Computer Science
[SOLVED] Strategies for Landmark Selection
1. In this example you will implement the algorithm for approximating distances in networks. First, you will select ?? landmarks ?? = {??1, ??2, ????} and then compute distances from each of these landmarks to all other nodes in the network. Using the upper bound on the distance you will approximate the distances for all pairs of nodes ?? and ?? by:?????,?? = ??????????? {???,???? + ???,???? }.To practically evaluate different strategies for selecting landmarks you will work with the network from the Les Misarables book. On the course web site you can find the network and a simple python code (https://courses.isds.tugraz.at/dhelic/websci/websci1.zip) showing you how to work with the network analysis library networxs (https://networkx.github.io/). This network has ?? = 77 nodes (76 nodes are in the giant component and you should work only with the giant component) and for each experiment you will select ?? = 10 landmarks. Implement these three strategies for landmark selection:(a) uniform random selection of landmarks, (b) random selection of landmarks proportional to the nodes degree, (c) random selection of landmarks inversely proportional to the nodes degree.To evaluate the strategies compute distances exactly for all pairs of nodes. Than compute absolute error for each pair of nodes ?? and ??:????,?? = |????,?? ? ?????,??|. Plot the histogram of absolute errors for all three strategies, together with the mean absolute error and the sample standard deviation of the error. Label the axes of your plots and provide a descriptive title for the plots. Include the mean and the standard deviation in the title of the plot. For all computations, plots, etc. you can either implement the code yourself or find an appropriate networxs function. For plotting use matplotlib and seaborn, which provides ready to use functions for various kinds of plots. In your report submit only the plots with a short discussion of what you see in the plots and which strategy worked best in your opinion. If your results are inconclusive you can repeat the selection of landmarks many times (e.g., 1000 times) and look at the averages over the landmark selections. In case of repetitions optimize your code by e.g., computing distances in a preprocessing step. You do not need to submit the code. For creating the report you can use the provided tex file to compile to PDF or create a PDF with any other tool that you like.
[SOLVED] Rewriting a Program
#include
[SOLVED] Cloud Adoption Policy
The following is project 1: Final Cloud Adoption Policy AddendumI have completed this assignment already. However, my professor wants me to review it and correct it or I will fail the class. It needs to be done no later than 11 May 2021. I’m attaching a Zip with the instruction, resources, and completed project that needs to be corrected.The following is my professor’s Feedback. PLEASE follow and correct what he asks:You have a well-written and well-organized paper, but it only covers about 60% of what is required. It appears that you followed the template almost exactly, which is a sure path to failing the project because it leaves out many of the competencies. I gave you credit for the competencies addressed, however, the remaining competencies listed below were not addressed at all or very little.I did not find any information related to the liability issues associated with cloud adoption. This is required competency as listed in 8.1. You will have to add in that content and re-submit.I did not find any information related to a plan for cloud implementation/migration. This is required competency as listed in 9.1. You will have to add in this content and re-submit.I did not find any information related to a documentation strategy to support cloud operation. This is required competency as listed in 9.3. You will have to add in this content and re-submit.I did not find any information related to a Disaster Recovery plan. This is required competency as listed in 11.7. You will have to add in this content and re-submit.You need to read (or re-read) my announcements on the requirements for this project and also my announcement on The Quickest way to Fail
[SOLVED] Comparing Software Development
Comparing Software Development WorkloadsEstimating the cost of developing software in terms of work load is difficult since it is a challenge to quantify the size and complexity of a software system. The article Analysis of Size Metrics and Effort Performance Criterion in Software Cost Estimation provides an overview of different metrics used to assess size and complexity (Malathi & Sridhar, 2012). The metrics include counts of lines of code, function point counts, and operation counts. Function point counts are often utilized because they can be estimated based on project design specifications.The dataset pointworkload.cvs contains data collected from 104 programming projects at AT&T between 1986 and 1991 (Matson & Huguenard, 2005). This dataset include number of work hours for each project, the function point count for each project, and identifiers for operating system, data management system, and programming language utilized. In this application, you will investigate whether operating system, data management system and programming language impact the number of work hours per function point for a project.Open the dataset pointworkload.csv in Excel. Create a new column that calculates the number of work hours per function point for each project. Save the file with this new data column.
[SOLVED] Interactive Computer Graphics
Run all the HTML programs in Canvas folder – Week 5 – Chapter 4Look at the image from different “views”Write your observation for- translation- rotation- Model view- Camera view
[SOLVED] Wall Street Journal
Wall Street Journal (WSJ) Posting: The purpose of this assignment is to stay current with business and world events. MBA students need to be aware of the events affecting the business world nationally and internationally.Please read a current WSJ article (must not be older than 3 months) and provide the following:1. Post the name of your WSJ Article in the Subject Line. Once an article has been chosen, another must be selected. I do NOT allow posting of the same article. The WSJ is available at The University Library.2. Provide a summary of the article and list three questions for the discussion of the article by Wednesday. Please select articles concerning business topics.3. Provide your reference for the WSJ article using APA format.4. Provide the link to access the article. Due to plagiarism and copyright laws, please do NOT post the article, only post the link to access the article.5. Reply to two other student posts by Sunday.
[SOLVED] Applied Computer Science
Besides computers constructed from electronic components what are the three other technologies that have been considered as future ways to fabricate computers
[SOLVED] Cyber Defense Solution
WEEKLY DISCUSSIONThinking back over all of the research that you have read during this course, identify one emerging or leading technology that you believe has the most potential as a cybersecurity or cyber defense solution.Write a one page (300 word) recommendation for this technology. Include in your recommendation three or more cybersecurity or cyber defense related benefits that you believe will be realized by companies who adopt this technology.Your audience for this recommendation is the CEO of a large company that is interested in finding and funding further research into promising cybersecurity related technologies.Post your recommendation paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.You must start a thread before you can read and reply to other threads.Three references required
[SOLVED] Cybersecurity Related Technologies
Thinking back over all of the research that you have read during this course, identify one emerging or leading technology that you believe has the most potential as a cybersecurity or cyber defense solution.Write a one page (300 word) recommendation for this technology. Include in your recommendation three or more cybersecurity or cyber defense related benefits that you believe will be realized by companies who adopt this technology.Your audience for this recommendation is the CEO of a large company that is interested in finding and funding further research into promising cybersecurity related technologies.Post your recommendation paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.You must start a thread before you can read and reply to other threads.Three references required
[SOLVED] Digital Forensics Data Acquisitions
Discussion 2.1Name and describe the three formats for digital forensics data acquisitions.Discussion 2.2You have been called to the scene of a fatal car crash where a laptop computer is still running. What type of field kit should you take with you?Discussion 3.1What are the functions of data run’s field components in an MFT record?Discussion 3.2Whats the advantage of a write-blocking device that connects to a computer through a FireWire or USB controller?
Use Promo Code: FIRST15