How big data analytics can be used with smart cities

Assignment Help Other Subject
Reference no: EM132585326

1. Data Science & Big Data Analy

Research Paper
This week's reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week's research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.

Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the required cover page and reference page.
• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. The UC Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2. Analyzing& Visualizing Data

Data: Simple Graphs in RStudio
Background: As we have learned, a lot of thought goes into the design of a visualization. This week we review how the data types influence the graphing types.
Assignment:
• Use RStudio to generate a word document with simple graphs of the following dataset: dataset_price_personal_computers.csv
• Review the slides to learn the data types requirements for each graph type: Analyzing and Visualizing Data - Selecting a Graph.pptx
• Use the following videos to learn the commands to produce simple graphs in RStudio: RStudio - Simple Graphs - Part1.mp4 | RStudio - Simple Graphs - Part2.mp4

Graphs to Produce:
Pie Chart:
• Create a pie chart of the computer ram
• Label the ram sizes as follows: 2GB, 4GB, 8GB, 16GB, 24GB, 32GB
• Title the pie chart as "Computer Ram"
• Color the pie chart using the rainbow option
Bar Plot:
• Create a barplot of the computer screen sizes
• Label the x axis as "Screen Sizes"
• Label the y axis as "Frequency"
• Title the barplot as "Computer Screen Sizes"
• Color the bars in the barplot any color you wish.
Histogram:
• Create a histogram of the computer prices
• Label the x axis as "Prices"
• Title the histogram as "Computer Prices"
• Give the histogram any color you wish.
Box Plot:
• Create a boxplot of the comparing the computer price and premium category
• Label the y axis as "Price"
• Label the x axis as "Premium"
• Title the boxplot as "Premium Computer Prices Distribution"
• Color the boxplot any color you wish.
Scatter Plot:
• Create a scatter plot of computer price and hard drive size
• Label the x axis as "Hard Drive Size"
• Label the y axis as "Price"
• Title the scatter plot as "Computer Price vs Hard Drive Size"
• Color the scatter any color you wish.
Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student's name, University's name, Course name, Course number, Professor's name, and Date.
Submit your assignment on or before the due date.

3. Security Architecture & Design

Assignment: Week 4 Individual Assignment 4
Length: Minimum of 600 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Figure 8.1 Business analytics logical data flow diagram (DFD).
Consider the data flow "octopus," as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

4. Business Intelligence

A.
Please select a topic from the below list and create a one-page essay answering the question noted below. Please use at least one reference and ensure it's in APA format (as well as the in-text citation). Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author's work and use in-text citations were necessary.
Note: The essay should be one-page at most (double spaced) and should include an APA cover page and at least one reference in APA format.
• Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
• List and briefly describe the nine-step process in conducting a neural network project.
• What is the main difference between classification and clustering? Explain using concrete examples.
• What are the privacy issues with data mining? Do you think they are substantiated?
• How does deep learning benefit AI? Use specific examples
• How does text mining differ from data mining? How does it benefit companies?
** Please note you have minimal space to complete the assignment, do NOT write an introduction, rather just answer the question noted above **

B.
Complete the following assignment in one MS word document:
After reading Chapter 7
Select one or more of the articles and explain how data mining was used. Feel free to use another source if you wish.
Submit a 1 to 2 page paper that explains the work done. All work must be original (not copied from any source). Be sure to cite your sources and use APA format

5. Emerging Threats &Countermeas

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.--3 replies 100 words each.

Attachment:- Data Science and Big Data.rar

Reference no: EM132585326

Questions Cloud

What is the current price of a common share : Can you give me a detailed answer for this with breakdown?
Protecting information-social media is protected : Describe how your information on social media is protected. Who is ultimately responsible to protect that information, the business or the consumer?
How to find towson company net cash flows : How to determine Towson Company's Net Cash Flows from Operating Activities. If the amount is an outflow then enclose the amount with dollar sign
Despite the documented challenges : Despite the documented challenges that the U.S. health care system faces, it also enjoys a number of advantages over other systems around the world.
How big data analytics can be used with smart cities : How Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations
Find the number of current ratio as of december : Find the number of current ratio as of December 31, 2018: (Round & enter your answers to one decimal place and enter the value.)
What are the expected one-year interest rates : What are the expected one-year interest rates next year and the following year?
What are the economic trends of the health care : Please help please! I am lost! I need answers for this please as follows:
Find the number of days in inventory : Find the number of days in inventory for 2018: (Use a 365 day year. Round & enter your answers to one decimal place and enter the value.)

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd