White paper of model building process

Assignment Help Programming Languages
Reference no: EM133635649

Project

With your group, you will prepare and present a (roughly) 30-minute power point presentation on the problem background; model building process and your recommendations. Provide a short white paper of your model building process, the selected model, and the model's properties. Include annotated code that replicates your analysis. Only discuss your work on this project with your group, the instructors or GTA's of the course.

The Problem
We are interested in incorporating typing dynamics into our password based security system. See the included paper for additional background on this type of biometric research. In prior work (namely last semester) it was noted that a user's typing dynamics change over time when they type a given passcode. We need to incorporate this information into the biometric system by finding a lower threshold (in terms of the number of times a person has typed a passcode in the past) with which we can start training the system.

For this project you are given access to a group of 51 individuals who have typed a passcode for a specific system.

The passcode used by this code is : \(.tie5Roanl\)

Dr. Roy Maxian and colleagues recruited 51 subjects at CMU. Subjects completed 8 data collection sessions, with each session composed of 50 times of typing the above passcode. Each session was one day apart. There is additional details concerning the data collection in the included paper.

FOR EACH SUBJECT, YOUR TASK IS TO FIND A SUBSET OF THEIR TYPING DATA THAT IS REPRESENTIVIE OF THE LEARNED TYPING BEHAVIOR.

This problem is going to be broken into the 4 following data analysis components or tasks.

[Sub-Task 1:] Develop a covariate that tells you the number of times a subject has typed the passcode in the past.

[Sub-Task 2:] For each subject, build three appropriate regression models for the total UD, total DD, and total H times in terms of the number of times the passcode has been typed.

[Sub-Task 3:] Use FDR's to assess reasonableness of the normality assumptions of the residuals after fitting model for all subjects.

[Sub-Task 4:] Draw conclusions and make recommendations based on your analysis.

The results of your analysis should be presented in a short white paper and 15 to 30 minute powerpoint slide deck and presentation scheduled during the first week of February.

Variables Recorded by the Keypad
The keypad on which the code is entered records the following times:

[H.period:] The amount of time that the "." is held down.

[DD.period.t:] The time between pressing down the "." key to the time to press down the "t" key.

[UD.period.t:] The time between the "." key coming up to the time to press down the "t" key.

[H.t:] The amount of time that the "t" is held down.

[DD.t.i:] The time between pressing down the "t" key to the time to press down the "i" key.

[UD.t.i:] The time between the "t" key coming up to the time to press down the "i" key.

[H.i:] The amount of time that the "i" is held down.

[DD.i.e:] The time between pressing down the "i" key to the time to press down the "e" key.

[UD.i.e:] The time between the "i" key coming up to the time to press down the "e" key.

[H.e:] The amount of time that the "e" is held down.

[DD.e.five:] The time between pressing down the "e" key to the time to press down the "5" key.

[UD.e.five:]The time between the "e" key coming up to the time to press down the "5" key.

[H.five:]The amount of time that the "5" is held down.

[DD.five.Shift.r:] The time between pressing down the "5" key to the time to press down the "shift+r" key combination.

[UD.five.Shift.r:] The time between the "5" key coming up to the time to press down the "shift+r" key combination.

[H.Shift.r:] The amount of time that the "shift+r" key combination is held down.

[DD.Shift.r.o:] The time between pressing down the "shift+r" key combination to the time to press down the "o" key.

[UD.Shift.r.o:]The time between the "shift+r" key combination coming up to the time to press down the "o" key.

[H.o:] The amount of time that the "o" is held down.

[DD.o.a:] The time between pressing down the "o" key to the time to press down the "a" key.

[UD.o.a:] The time between the "o" key coming up to the time to press down the "a" key.

[H.a:] The amount of time that the "a" is held down.

[DD.a.n:] The time between pressing down the "a" key to the time to press down the "n" key.

[UD.a.n:] The time between the "a" key coming up to the time to press down the "n" key.

[H.n:] The amount of time that the "n" is held down.

[DD.n.l:] The time between pressing down the "n" key to the time to press down the "l" key.

[UD.n.l:] The time between the "n" key coming up to the time to press down the "l" key.

[H.l:] The amount of time that the "l" is held down.

[DD.l.Return:] The time between pressing down the "l" key to the time to press down the "return" key.

[UD.l.Return:] The time between the "l" key coming up to the time to press down the "return" key.

[H.Return:] The amount of time that the "return" is held down.

Grading
Your grade will be assessed by the zoom presentation and by my reviewing of the following three components:

1. The write-up of the methods you have used.

2. The presentation of the results of your data analysis.

3. The annotated R code used to perform the analysis.

We will first focus on the Powerpoint slides and if something is unclear we will move to the write up and finally the rmd file to figure out what you have done. Ideally we will only need to look at the Powerpoint slides to understand what you have done.

You will need to turn in the following three components before the group presentation:

1. An annotated R-script that replicates your data analysis. (This should take the form of an .rmd file.)

2. A write-up your data analysis that includes your interpretation and description of the methods used. This should include appropriate graphical methods. (Submitted as a .pdf file.)

3. A powerpoint presentation discussing and presenting the results of your analysis. (Submitted as a .pdf file.)

Do ask me (or any of the other course instructors) for help if you are having trouble. Beware this is a rather open ended exam.

Reference no: EM133635649

Questions Cloud

Explain how the different areas of health are interrelated : Discuss and provide specific examples for some of the main differences and similarities. Explain how the different areas of health are interrelated.
Defend research findings and solutions to a client : Client Presentation: Artefact Model - Collaborate with colleagues in the completion of IT-based research activities
Define the theory behind the use and practice of assessments : Define the theory behind the use and practice of psychological assessments. Psychological assessments comprise the measurement of psychological constructs.
What do the primary sources found in sources : HIS 101- What do the primary sources found in Sources, reveal about the increased interactions between Greeks and others peoples as well as place and status?
White paper of model building process : Provide a short white paper of your model building process, the selected model, and the model's properties. Include annotated code that replicates your analysis
Describe the general features of innate immunity : Describe the general features of innate immunity. Describe how normal microbiota may impact immune responses and limit pathogens.
Describe a strategy, such as a policy or program : Describe a strategy, such as a policy or program, currently in place to address the identified diversity or disparity issue. Determine whether this strategy
What three things about work are most important to me : What three things about work are most important to me? Which academic subject do I excel in? Where have I had successful experiences (personal and professional)
Struggle with achieving or maintaining an erection : Bob does not struggle with achieving or maintaining an erection, but he almost always ejaculates before he wants to, just moments before penetration.

Reviews

Write a Review

Programming Languages Questions & Answers

  Compares lisp with either prolog java c-cpp or python

Write a short paper (800-1000 words) that compares and contrasts Lisp with either Prolog, Java, C/C++, or Python.

  Create logic for program which contains housekeeping

Create logic for program in pseudocode or flowchart which contains housekeeping, detail loop, and end-of-job modules, and which computes service charge and the original check amount customers owe for writing bad check.

  Write a program that reads a string

Write a program that reads a string and outputs the number of times each lowercase vowel appears in it. Your program must contain a function with one of its parameters as a string variable.

  Create a simple logging service

300698 Operating Systems Programming - Western Sydney University - In case study you will implement a simple logging service built on top of a message queue

  Front end applications

How does a compiled binary executable store on the client computer?

  What causes an infinite loop and how do we break it

Write a loop to print all multiples of three from 0 to 100. What causes an infinite loop? How do we break it? Write a program to compute the impedance, Z, and inductance, L, of an electrical coil given voltage, V.

  List the contents of the current directory

List the contents of the current directory. Create the directory structure and create the files as defined in the previous Individual Project.

  Create a report that should be printed on the console

Create a report that should be printed on the console with the following header followed by the details of each car. Your file should contain at least 5 cars

  State where fuzzing technique should be used

State a problem that can occur with input validation when the Unicode character set is used. Define input fuzzing. State where this technique should be used.

  Explain what can go wrong in resource management on c++

Explain What can go wrong in resource management on c++?

  Explain secure programming techniques

Explain secure programming techniques. The paper must have: an introduction; use empirical studies regarding insecure programming techniques.

  How can two cubical dice be labeled using number

Alice and Bill flip a fair coin until one of the respective patterns A = HHT or B = HTT appears for the first time (and then the corresponding player wins).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd