[SOLVED] Artificial Neural Networks

1.What are artificial neural networks (ANN)? Identify 5 types of ANN and what they can be used for.2.Use Google Scholar (scholar.google.com) to locate two papers since 2016 that use machine learning in one subject area (health, retail, oil and gas, etc.). Identify the problem domain. Compare and contrast the analysis methods. Do you feel one method was better than the other?3.List and briefly describe the nine-step process in conducting a neural network project.4.How can deep learning be used to fight fraud? List some of the tools that can be used and how they detect the fraud.5.List and explain 3 methods of deep learning. Give examples of when they should be used.Note: Each question requires a response of at least 300 words. Proper citations and references should be used.

Read more

[Solved] Java Script

After weeks of intense work your client is excited to view the final Web page:Remember to include:A consistent design and color schemeAn external CSS document to control these aspectsCSS applied to a single pageUse of inline stylesA consistent navigation between parts of your siteA minimum of 5-8 pagesAt least three external hyperlinksAn email link with the subject filled inA form (it does NOT have to connect to a database because that is beyond the scope of this class)Properly placed images on at least three pagesThe use of alert message on one pageJavaScript that adds value to your page. This could be mouseover events for navigation, a photo gallery, form field validation, performing a calculation in a form (such as adding tax or shipping), etc.JavaScript additionsThe preparation of the desktop and mobile versions of your site.Now that you have begun to write your pages in HTML, please add the following to a comment in the of your work:Name, date, week #, class with section, and campus # (i.e. CIS273001VA016)

Read more

[Solved] CIS Web Design

For this assignment, you’re going to begin to work on your site. Based on your storyboard and client feedback (professor’s comments), create three pages of your site that include the following:Navigation links that are consistent on all pagesAt least two folders in your file structureInformation about the site’s purpose on the home page (named index.html)Images on at least two pagesA link to a specific location on one page from a different pageTwo different listsNow that you have begun to write your pages in HTML, please add the following to a comment in the of your work:Name, date, week #, class with section, and campus # (i.e. CIS273001VA016)Always zip your work into a single folder for uploading to Blackboard. You’ll want to keep each week separate so that you can review earlier iterations of your site, in case you want to revert something back based on feedback from your professor.

Read more

[Solved] Democracy and Ethics

Watch the Ted Talks regarding Democracy and Ethics in Module 4. Simply discuss the key points from each video and state what you agree with and disagree with.The discussion and original post will occur in groups. All students must respond to one of the other group member’s posting.Each discussion’s original post into the group DB should be a minimum of 300 words in length and the responses to another colleague in the Group DB should approximate 200 words

Read more

[Solved] Information Technology Implementations

· Task-1 Enterprise discussion (1 page with proper inline citations, references, APA format and No plagiarism)Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(9), 195. Retrieved from https://doi.org/10.3390/fi11090195Puchley, T., & Toppi, C. (2018). ERM: Evolving From Risk Assessment to Strategic Risk Management. HFM (Healthcare Financial Management), 1–5.· What are some of the potential risks involved with cloud computing?· Does the research and model in this article propose a viable solution to cloud-based risk management?Task-2Enterprise paper (4 pages with proper citations, references, APA format and No plagiarism)What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?• Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.Task-3Organ Leader discussion: (1 page with proper citations, references, APA format and No plagiarism)KCIL, U., ALTINAY, Z., DAGLI, G., & ALTINAY, F. (2019). The Role of Technology Leadership: Innovation for School Leadership in Digital Age. ELearning & Software for Education, 2, 323. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=edb&AN=135939718&site=eds-live&custid=s8501869&groupid=main&profile=eds_newAfter completing the reading this week, we reflect on a few key concepts this week:1. Discuss what ethical leadership is and how it impacts the organizational culture.2. What are the various dimensions of ethical leadership?3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.Task-4 Organ Leader paper: (4 pages with proper citations, references, APA format and No plagiarism)AKCIL, U., ALTINAY, Z., DAGLI, G., & ALTINAY, F. (2019). The Role of Technology Leadership: Innovation for School Leadership in Digital Age. ELearning & Software for Education, 2, 323. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=edb&AN=135939718&site=eds-live&custid=s8501869&groupid=main&profile=eds_new This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations?How does servant leadership assist with transferring knowledge in an organization?When thinking about data analytics, how does transformational leadership assist with building good data structures?

Read more

[Solved] Uses of Email Filters

Discuss uses of Email filters, Rerouting ‘spam’ and selective browsing. Answer must be 400 words.

Read more

[Solved] Computer Networks.

Step 2: Identify Examples of Vulnerabilities, Threats, andRisksIn the previous step, you familiarized yourself with the concepts ofvulnerability, threat, and risk. You now understand their relationship toone another and how they relate to security. In this step, you are goingto identify at least two examples of a vulnerability, two examples of athreat, and two examples of a risk in each of the following categories:? technology? people (human factors)? policyIdentify a minimum of 18 examples. This will assist you in conductingthe vulnerability assessment and developing the educational brochure.Review topics such as basic elements of communication and computernetworks.In the next step, you will look more closely at current vulnerabilities andthreats.Step 3: Identify Current Vulnerabilities and ThreatsAfter defining and identifying examples of vulnerabilities, threats, andrisks in the first two steps, you should understand the basic concepts ofvulnerabilities and threats as they apply to general cybersecurity.However, vulnerabilities and threats are dynamic: They can evolve withchanges in technologies, changes in adversary capabilities orintentions, or changes in human behaviors and organizational policies.It is important to understand current vulnerabilities and threats andtheir applicability to the larger community as well as to yourorganization (e.g., critical infrastructure protection), so that you canmake informed recommendations on how/whether to mitigate them.Identify current known vulnerabilities and threats that could affect yourorganization. The vulnerabilities and threats that you identify will benecessary for your final presentation.List a minimum of two current known vulnerabilities and threatsinvolving the following:? people (human factors)? technology? policyWhen complete, move to the next step, where you will take part in asimulation.

Read more

[Solved] Technology Solutions

Competitors and Technology[In the section below, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating, to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario.]Technology One [Replace heading with the technology selected (e.g., Social Media)][Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.]Technology Two [Replace heading with the technology selected (e.g., Social Media)][Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.]Technology Benefit[Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach.]Technology Solutions[In the section below, you will discuss how each of the two technologies meets the technology requirements that you identified in section II. Use your decision matrix to guide your responses.]Technology One[Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps.]Technology Two[Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps.]

Read more

[Solved] Review of Literature

MAKE AN DRAFT FOR CHAPTER1 CHAPTER2 AND CHAPTER3Dissertation Chapters:Chapter I: Introduction.Chapter II: Review of Literature.Chapter III: Methodology (Research Design & Methods)750 words with APA Formet

Read more

[Solved] Financial Benefits

Please help with following written assignment, do not give nonsense word salads as answer, be concise:Chapter 12:· Discussion 1: Some people say that chatbots are inferior for chatting. Others disagree. Discuss.· Discussion 2: Discuss the financial benefits of chatbots.· Discussion 3: Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.· Exercise 1: Compare the chatbots of Facebook and WeChat. Which has more functionalities?· Exercise 12: Research the role of chatbots in helping patients with dementia.· Exercise 16: Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.Chapter 13:· Discussion 1: Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.· Discussion 2: Diagnosing infections and prescribing pharmaceuticals are the weak points of many practicing physicians. It seems, therefore, that society would be better served if analytics-based diagnostic systems were used by more physicians. Answer the following questions:· Why do you think such systems are used minimally by physicians?· Assume that you are a hospital administrator whose physicians are salaried and report to you. What would you do to persuade them to use an intelligent system?· If the potential benefits to society are so great, can society do something that will increase doctors’ use of such intelligent systems?· Discussion 3: What are some of the major privacy concerns in employing intelligent systems on mobile data?· Discussion 4: Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.· Exercise 3: Investigate the American Bar Association’s Technology Resource Center (americanbar.org/groups/departments_offices/legal_technology_resources.html) and nolo.com. What are the major legal and societal concerns regarding intelligent systems? How are they being dealt with?· Exercise 4: Explore several sites related to healthcare (e.g., WebMD. com, who.int). Find issues related to AI and privacy. Write a report on how these sites suggest improving privacy.Exercise 6: Research the issue of voice assistants and privacy protection. Start by reading Collins (2017) and Huff (2017).Your paper should meet these requirements:· Minimum 5 pages length, not including the required cover page and reference page. Also do not include questions, just number and the answer.· Run your submission on a grammar check before submitting· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.· References should be relevant and recent (in last 3 years). No bogus and made-up references· If you need to quote from reference, do not exactly quote, rephrase the quote as direct quote increases plagiarism percentage.· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.