Reference no: EM132579540 , Length: 3600 Words
1. Data Science & Big Data Analytics
Research Paper
This week's reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week's research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.
Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the required cover page and reference page.
• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. The UC Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
2. Analyzing and Visualizing Data
Data: Simple Graphs in RStudio
Background: As we have learned, a lot of thought goes into the design of a visualization. This week we review how the data types influence the graphing types.
Assignment:
• Use RStudio to generate a word document with simple graphs of the following dataset: dataset_price_personal_computers.csv
• Review the slides to learn the data types requirements for each graph type: Analyzing and Visualizing Data - Selecting a Graph.pptx
• Use the following videos to learn the commands to produce simple graphs in RStudio: RStudio - Simple Graphs - Part1.mp4 | RStudio - Simple Graphs - Part2.mp4
Graphs to Produce:
Pie Chart:
• Create a pie chart of the computer ram
• Label the ram sizes as follows: 2GB, 4GB, 8GB, 16GB, 24GB, 32GB
• Title the pie chart as "Computer Ram"
• Color the pie chart using the rainbow option
Bar Plot:
• Create a barplot of the computer screen sizes
• Label the x axis as "Screen Sizes"
• Label the y axis as "Frequency"
• Title the barplot as "Computer Screen Sizes"
• Color the bars in the barplot any color you wish.
Histogram:
• Create a histogram of the computer prices
• Label the x axis as "Prices"
• Title the histogram as "Computer Prices"
• Give the histogram any color you wish.
Box Plot:
• Create a boxplot of the comparing the computer price and premium category
• Label the y axis as "Price"
• Label the x axis as "Premium"
• Title the boxplot as "Premium Computer Prices Distribution"
• Color the boxplot any color you wish.
Scatter Plot:
• Create a scatter plot of computer price and hard drive size
• Label the x axis as "Hard Drive Size"
• Label the y axis as "Price"
• Title the scatter plot as "Computer Price vs Hard Drive Size"
• Color the scatter any color you wish.
Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student's name, University's name, Course name, Course number, Professor's name, and Date.
3. Security Architecture & Design
Length: Minimum of 600 words
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Figure 8.1 Business analytics logical data flow diagram (DFD).
Consider the data flow "octopus," as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?
4. Business Intelligence
A.
Please select a topic from the below list and create a one-page essay answering the question noted below. Please use at least one reference and ensure it's in APA format (as well as the in-text citation). Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author's work and use in-text citations were necessary.
Note: The essay should be one-page at most (double spaced) and should include an APA cover page and at least one reference in APA format.
• Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
• List and briefly describe the nine-step process in conducting a neural network project.
• What is the main difference between classification and clustering? Explain using concrete examples.
• What are the privacy issues with data mining? Do you think they are substantiated?
• How does deep learning benefit AI? Use specific examples
• How does text mining differ from data mining? How does it benefit companies?
** Please note you have minimal space to complete the assignment, do NOT write an introduction, rather just answer the question noted above **
B.
Complete the following assignment in one MS word document:
After reading Chapter 7 Go to sas website
Select one or more of the articles and explain how data mining was used. Feel free to use another source if you wish.
Submit a 1 to 2 page paper that explains the work done. All work must be original (not copied from any source). Be sure to cite your sources and use APA format
5. Emerging Threats &Countermeas
This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.
Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.--3 replies 100 words each.
Attachment:- Data Science.rar