Testing Wifi

 

One of your continuing clients has engaged you to conduct a wireless assessment and penetration test of their infrastructure. Your client has asked you to brief them on the methodology you will use and the tools you would select to complete this engagement.

Briefly, lay out your proposed methodology with a brief explanation of each step and any tools you would use to support a given step.

200-250 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

outside services

 

  • When you’re searching for contractors, consultants, business partners, software, and hardware, what are some methods you use? Be very specific and detailed in how you research these resources and give more than one example (contractor and software search, for example).
    • What method do you use for keeping track of your contacts and leads?
  • Once you have a list of resources, how do you decide which to recommend to your company to select for your project? (If you have never done this, research a methodology and report on how you plan to do it.)
    • If you are selecting contractors, consultants, or other human resources, recommend an interview process and gather the costs.
    • If you are looking at software, hardware, or other non-human resources, talk about how you determine the most value to the company for the money. The company is making an investment; how do you determine the best investment for the greatest return? (Be specific on the methodology you use or would use.)
  • After responding to the above, write an additional paragraph on why you think your recommendation should be followed and how you can be confident that your recommendation is best for your organization.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Espionage

 

  • A company has a potential case involving their trademark. Describe some steps you might suggest at a meeting with the officers of the corporation to investigate a crime involving trademark infringement. What if it were a sexual harassment case? What are the similarities or differences between the two types of cases?

  • Describe the steps you would suggest for investigating a corporate espionage case.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Bash Script for changing Root password of a server

Create a bash script for changing root password for list of servers
Input :- read list of servers from a file, take password for user1, root password & new root password.

The script should loop through all the servers in the input file
login to server as user1
Then log as root (su -)
should take password directly from the inital input
Echo ” logged in as root and display server name”
Change root password with new passsword
Check if password change was successful and display output (success or failure)

sample change on one server:-
ssh user1@server01
Password of user1
[user1@server01]$su –
root password(this should directly take from input)
[root@server01 ~]# passwd
Changing password for user root.
New password:
Retype new password:
passwd: password successfully changed for root
passwd: all authentication tokens updated successfully.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 1 Discussion 2: Client Access License

 SO I NEED A TOTAL 1 POST AND 2 REPLY POST I HAVE SENT THE 2 POST I HAVE TO REPLY TO AND THE INSTRUCTIONS OF THE POST I MUST CREATE.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Analysis & Decision Making

Assessment Description

The purpose of this assignment is to show how business decisions can be made by using rigorous decision-making techniques.

Using specified data files, chapter example files, and templates from the “Topic 8 Student Data, Template, and Example Files” topic material, complete Chapter 6, Problems 2, 31 (part a), 32, and 33 from the textbook. Use Microsoft Excel to complete Problem 2. Use the Palisade DecisionTools software to complete Problems 31, 32, and 33, and ensure that all Palisade software output is included in your files. The Palisade DecisionTools Excel software needs to be used to create the decision trees.

To receive full credit on the assignment, complete the following.

  1. Ensure that the Palisade software output is included with your submission.
  2. Ensure that Excel files include the associated cell functions and/or formulas if functions and/or formulas are used.
  3. Include a written response to all narrative questions presented in the problem by placing it in the associated Excel file.
  4. Place each problem in its own Excel file. Ensure that your first and last name are in your Excel file names.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Digital forensics Report

 

Task 2: Digital Forensics Report (20%) (20 marks)

In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario:

You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc.  This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu’s new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments.  Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).

Chris also found a USB drive on the desk Tom Johnson was assigned to.  Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence.  In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the “C08InChp.exe” file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019). 

Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.

Deliverable: For this forensic examination, you need to provide a report of 1800-2000 words in the format described in presentation section below.

 

Presentation

back to top

The following should be included as minimum requirements in the report structure:

Executive Summary or Abstract
This section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion
• Table of Contents
• Introduction
Background, scope of engagement, forensics tools used and summary of findings
• Analysis Conducted
o Description of relevant programs on the examined items
o Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etc
o Graphic image analysis
• Findings
This section should describe in greater detail the results of the examinations and may include:
o Specific files related to the request
o Other files, including any deleted files that support the findings
o String searches, keyword searches, and text string searches
o Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activity
o Indicators of ownership, which could include program registration data.
• Conclusion
Summary of the report and results obtained
• References
You must cite references to all material you have used as sources for the content of your work
• Glossary
A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.
• Appendices
You can attach any supporting material such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation.

Follow the referencing guidelines for APA 6 as specified in Referencing Guides.

Please insert screenshots of autopsy of every step .

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

pyspark Batch Gradient Descent

This homework need implement Batch Gradient Descent to fit a line into a two dimensional data set. You will implement a set of Spark jobs that will learn parameters for such line from the New York City Taxi trip reports in the Year 2013. 

All the homework demand has been uploaded on file. Please only write the pyspark code for small data that I uploaded. I will run the final code on the my large data set. I only need py file for all the task.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 1: Explore Networking in the Cloud ( please submit Steps 4, 5, 6, and 7 separately)

****Please submit Steps 4, 5, 6, and 7 separately, before submitting the completed project 1****

In CCA 610: Cloud Services and Technology, you assumed the role of an IT analyst at BallotOnline, a company providing electronic voting solutions worldwide. Your proposal to begin migrating systems to the cloud has been approved.

BallotOnline has now initiated preparations for the cloud deployment. The company decided to start with deeper investigations of crucial technologies enabling cloud computing. You became acquainted with the basics of these technologies in CCA 610. 

In this project, you will conduct more in-depth investigation of cloud networking, which makes cloud connectivity on-demand operations possible. You need to have a good understanding of this as you prepare the BallotOnline network for migration to the cloud as well as designing the appropriate network infrastructure in the cloud for BallotOnline.

To do that, you will assume the role of a BallotOnline network engineer. You will explore the network protocols that enable the company and its customers to connect to the cloud, as well as technologies making it possible to create on-demand in-cloud virtual networks into which the cloud resources will be deployed.

You will conduct two lab experiments exploring the TCP/IP protocols and software-defined networking. You will also perform a subnetting task to demonstrate your understanding of TCP/IP network addressing. Your final deliverable will be the technical report describing your findings and explaining the use of these technologies for BallotOnline’s cloud deployment.

Step 1: Review Networking Concepts

In this step, you will establish an understanding of networking concepts and terms. It will help the recipients of your technical report, including BallotOnline’s technical management, to become familiar with networking vocabulary and definitions.

You will start with reviewing basic networking concepts such as local area network (LAN), Ethernet, and packet switching—the technique of splitting transmitted data into smaller portions and transmitting them separately. 

Splitting data into packets, transmitting the packets reliably, and reassembling the data is performed by networking software. It is important to know about basic networking concepts since they serve as the underlying technology for cloud computing. This will ultimately prepare you to submit your technical report for this project. (http://intronetworks.cs.luc.edu/current/html/intro.html)

Networking software follows the popular model of layered design of network protocols, with each layer using the functionality of the layer below it and implementing new functionality to be used by the layer above. The technical report should include the popular internet suite of protocols—TCP/IP. Application protocols such as HTTP or SMTP are implemented in layers above TCP/IP. (http://intronetworks.cs.luc.edu/current2/html/tcpA.html?highlight=transmission%20control%20protocol)

Other basic networking concepts include Domain Name Service, network firewalls, and Network Address Translation. As the network engineer for BallotOnline, you know that these protocols play an important role in enabling cloud computing. 

Step 2: Explore Internet Packet Switching—IP

The Internet Protocol (IP) is the workhorse of today’s internet connectivity. As the network engineer for BallotOnline, you know that today’s cloud computing is built on top of IP. Most communication between systems in the cloud is done using this protocol.

IP employs the technique of packet switching, which breaks the data to be transmitted into smaller parts, called packets or datagrams, that are sent over the network independently. Understanding IP is crucial to designing and maintaining cloud deployments, which are provisioned within virtual IP networks and accessed via global internet. You will review the basic elements of IP protocol and include their brief discussion in your technical report.

Network devices have a network address to allow other devices to connect to it. The network addresses used in IP are called IP addressing. BallotOnline will need IPv4 addressing to be able to provide network addresses to a cloud system and to create a virtual network in the cloud.

Every system on the network must have an IP address. The assignments of IP addresses to the network systems can be done manually or dynamically through a Dynamic Host Configuration Protocol (DHCP) server. As the network engineer for BallotOnline, you know that manually assigning IP addresses is time-consuming and should only be used on a small number of systems where the IP address will not change frequently. (http://intronetworks.cs.luc.edu/current/html/ipv4.html#dynamic-host-configuration-protocol-dhcp)

Because numeric addresses are not human-friendly, a domain/machine naming convention defines human-readable names for internet hosts. An internet-based service called DNS (Domain Name System) provides translation between the IP addresses and the domain names. In general, people will use the domain names when addressing a system on the internet instead of using its IP address. You will need to explain in the technical report how DNS is used alongside IP addresses.  

As the network engineer for BallotOnline, you also know the importance of IP routing, the mechanism used to route the IP packets across the internet from the sender to the recipient. IP routing of IP packets is accomplished by network routers, which determine the next destination for each packet and are able to learn new routes. (http://dtucker.cs.edinboro.edu/IPRouting.htm) (https://www.learncisco.net/courses/icnd-1/lan-connections/packet-delivery-process-at-l3.html)

Step 3: Investigate Internet Transport—TCP

As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called Transmission Control Protocol (TCP), responsible for creation, reliability of delivery, and proper assembling of data packets. 

In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report. 

In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages. 

To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses sliding windows for packets remaining in processing at a given time, at both the sender and receiver ends. (http://intronetworks.cs.luc.edu/current/html/slidingwindows.html#sliding-windows)

Step 4: Review Advantages of IP Subnetting

One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232,, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are under way to assure wide adoption, IPv4 is still widely used.

One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.

For a given large network, rather than addressing all the hosts using the host part of the address, subnetting allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits. ( http://intronetworks.cs.luc.edu/current/html/ipv4.html#ipv4-subnets ). It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.

As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization’s needs. BallotOnline has been assigned a network address block by the Internet Assigned Numbers Authority (IANA). ( https://www.iana.org/ )

Because BallotOnline has several offices around the world, you will need to subnet this network address to assign just the right number of addresses to each office location based on the number of systems at that office location (the network address assigned by IANA and the number of offices along with their sizes is provided bellow).

Your task is to create the appropriate number of subnets with the right size to optimize the network.

Your technical report should include Classless Interdomain Routing (CIDR) notation, which allows for specifying a variable-length network as part of the IPv4 address, leaving the rest for addressing hosts within the network. ( https://opensource.com/article/16/12/cidr-network-notation-configuration-linux )

***Network address assigned by IANA and the number of offices along with their sizes***

+++Submission for Project 1: Subnetting+++

The first interim deliverable for Project 1 is for you to learn about subnetting and demonstrate that you know how to do this.

Below, please find a list of 30 subnetting problems.  Make sure no two students select the same project. Please select one that you want to do.  Please reply to this thread with your selected problem number. As I see them, I will scratch them from the list.

You are to perform subnetting on your given network.  The deliverable is for you to provide the following information for each of the subnet identified (there are four of them for each problem):

  • Network address
  • Subnet Mask
  • Range of IP Addresses available
  • Broadcast Address
  • The number of subnets that you will be able to get
  • The number of hosts that each subnet will be able to have

You will also need to show the calculation on how you get your answers.

1. 214.135.174.0/24 subnetted to 23 subnets and provide information for subnets #1, #4, #5, and #23
2. 209.44.165.0/24 subnetted to 18 subnets and provide information for subnets #1, #4, #5, and #18
3. 208.101.170.0/24 subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16
4. 201.107.51.0/24 subnetted to 9 subnets and provide information for subnets #1, #4, #5, and #9
5. 196.4.85.0/24 subnetted to 13 subnets and provide information for subnets #1, #4, #5, and #13
6. 197.231.214.0/24 subnetted to 9 subnets and provide information for subnets #1, #4, #5, and #9
7. 217.86.213.0/24 subnetted to 14 subnets and provide information for subnets #1, #4, #5, and #14
8. 219.141.75.0/24 subnetted to 21 subnets and provide information for subnets #1, #4, #5, and #21
9. 217.64.152.0/24 subnetted to 18 subnets and provide information for subnets #1, #4, #5, and #18
10. 199.90.199.0/24 subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16
11. 208.198.235.0/24 subnetted to 14 subnets and provide information for subnets #1, #4, #5, and #14
12. 200.203.113.0/24 subnetted to 26 subnets and provide information for subnets #1, #4, #5, and #26
13. 212.166.231.0/24 subnetted to 14 subnets and provide information for subnets #1, #4, #5, and #14
14. 207.229.107.0/24 subnetted to 26 subnets and provide information for subnets #1, #4, #5, and #26
15. 202.46.198.0/24 subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16
16. 197.142.43.0/24 subnetted to 24 subnets and provide information for subnets #1, #4, #5, and #24
17. 197.183.21.0/24 subnetted to 10 subnets and provide information for subnets #1, #4, #5, and #10
18. 219.62.162.0/24 subnetted to 29 subnets and provide information for subnets #1, #4, #5, and #29
19. 200.103.113.0/24 subnetted to 22 subnets and provide information for subnets #1, #4, #5, and #22
20. 208.142.121.0/24 subnetted to 18 subnets and provide information for subnets #1, #4, #5, and #18
21. 199.228.167.0/24 subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16
22. 197.216.7.0/24 subnetted to 18 subnets and provide information for subnets #1, #4, #5, and #18
23. 211.220.70.0/24 subnetted to 22 subnets and provide information for subnets #1, #4, #5, and #22
24. 200.199.177.0/24 subnetted to 24 subnets and provide information for subnets #1, #4, #5, and #24
25. 197.7.221.0/24 subnetted to 10 subnets and provide information for subnets #1, #4, #5, and #10
26. 211.30.43.0/24 subnetted to 12 subnets and provide information for subnets #1, #4, #5, and #12
27. 212.96.179.0/24 subnetted to 22 subnets and provide information for subnets #1, #4, #5, and #22
28. 197.21.197.0/24 subnetted to 22 subnets and provide information for subnets #1, #4, #5, and #22
29. 200.190.92.0/24 subnetted to 16 subnets and provide information for subnets #1, #4, #5, and #16
30. 209.50.103.0/24 subnetted to 9 subnets and provide information for subnets #1, #4, #5, and #9

+++Submission for Project 1: Lab 1 Report+++ (File CCA 625 Project 1: Analyzing Network Traffic Using Wireshark attached)

Step 5: Capture and Analyze Network Traffic

Another skill that you will need as the network engineer for BallotOnline is being able to capture network traffic. It’s important to analyze network traffic to find and troubleshoot network issues. This method is commonly used to identify a malfunctioning network device or to detect a possible network issue, such as an ongoing network attack.  Normally, this process can take hours, days, or even weeks, depending on the size of the network and the specific traffic that you are trying to capture and analyze.  In this scenario, you will be provided with a captured network traffic and you will be directed to look for specific network packets.

You will use Wireshark, a popular open-source network traffic capture and analysis tool. To analyze the capture file provided to you, here is an introductory tutorial. (https://www.wireshark.org/) ( https://www.wireshark.org/video/wireshark/introduction-to-wireshark/ )

Follow the steps in the Analyzing Network Traffic Using Wireshark Guide and prepare a lab report with answers and screenshots to support your answers. The lab report will be attached to your final technical report to demonstrate your proficiency in using the tool to do basic network analysis.

Step 6: Explore Networks Inside the Cloud—SDN

Cloud computing defines network resources as needing to be “rapidly provisioned and released with minimal management effort or service provider interaction” (Mell & Grance, 2011), As cloud networks developed, it was clear that further virtualization of network devices such as switches and routers was needed.

This led to what is known as software-defined networking (SDN) technology, enabling programmatic interfaces to control functions of these devices. ( http://ipj.dreamhosters.com/wp-content/uploads/issues/2013/ipj16-1.pdf ). You know that it will be important for management to understand how SDN supports cloud deployments like BallotOnline’s, so it will be a key part of your technical report.

Instead of manually programming network devices to configure a LAN, cloud management systems using SDN can set these devices up to forward packets to particular destinations by “calling” SDN APIs (application programming interfaces – libraries of software routines). This allows for the creation of virtual networks in the cloud by software.

The most popular SDN standard is OpenFlow by the Open Networking Foundation (https://www.opennetworking.org/).  OpenFlow switches include SDN controllers, which maintain flow tables to control forwarding of IP datagrams, and they can learn routes as IP packets when particular source and destination addresses arrive.

References

Mell, P., & Grance, T. (2011). SP 800-145: The NIST definition of cloud computing. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-145/final

Once you participate in the discussion below, proceed to the next step. There, you will use a network simulator to show how packets are transmitted.

Software-Defined Network Discussion

Discuss what software-defined networking is and what networking challenges it addresses. What is the role of OpenFlow protocol? Describe how BallotOnline could benefit from SDN in its cloud deployment.

Once you have submitted your post, make sure your response advances the conversation. Do not simply agree or disagree with a post, but instead explain the reasons for your opinions and how they relate to your experiences.

Use the discussion to develop awareness, share your thoughts, ask questions, and reflect.

Step 7: Simulate a Network With Mininet

Submission for Project 1: Lab 2 Report

Step 7: Simulate a Network With Mininet

To demonstrate your understanding how network packets are transmitted in the cloud, you will use Mininet, (http://intronetworks.cs.luc.edu/current/html/mininet.html#installing-mininet) a popular open-source network simulator that can be used together with Wireshark. This demonstration will be part of your technical report.  Follow the steps in this Simulating a Network Using Mininet and Analyzing Packets Using Wireshark Guide. (https://leocontent.umgc.edu/content/dam/course-content/tgs/cca/cca-625/document/SimulatingaNetworkusingMininetandAnalyzingPacketsusingWireSharkGuide.pdf?ou=535215).

During the lab, you will provision an EC2 instance in AWS using a preconfigured AWS Machine Image (AMI) and use the Mininet simulator in the EC2 instance to create two hosts. You will then use Wireshark to capture the packet exchanges. (https://aws.amazon.com/ec2/?ec2-whats-new.sort-by=item.additionalFields.postDateTime&ec2-whats-new.sort-order=desc) ( https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-best-practices.html )

You will prepare a lab report as per the lab guide and attach it to your final technical report.

In the next step, you will put together your technical report for BallotOnline.

Step 8: Submit Networking in the Cloud Technical Report

As your final submission, you will write a technical report about networking in the cloud. It will be addressed to BallotOnline technical managers to help them understand how these networking technologies will be implemented as BallotOnline migrates to the cloud.

It will include technical review of the topics covered in the project. Follow the Networking in the Cloud Technical Report Template to cover all the topics required ( https://leocontent.umgc.edu/content/dam/course-content/tgs/cca/cca-625/document/CCA625Project1_NetworkingintheCloudTechnicalReportTemplate.docx?ou=535215 ). 

Make sure you provide headings to clearly identify sections of your report. The technical review part of the report should be eight to 12 pages. You should also include both Project 1 lab reports (1 and 2), with incorporated feedback from Steps 5 and 7 if any.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data mining Assignment 12

  

Chapter 9 : Data Mining
Cluster Analysis: Advanced Concepts
and Algorithms – Check Point

Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

  1. For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?
  2. Describe the change in the time complexity of K-means as the number of clusters to be found increases.
  3. Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
  4. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
  5. Explain the difference between likelihood and probability.
  6. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of the connection (interconnectedness) of clusters.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now