polynomial regression

 

In this problem, we write a program to estimate the parameters for an unknown polynomial using the polyfit() function of the numpy package. 

1)Please plot the noisy data and the polynomial you found (in the same figure). You can use any value of m selected from 2, 3, 4, 5, 6.

2)Plot MSE versusorder m,for m = 1, 2, 3, 4, 5, 6, 7, 8respectively.Identify the best choice of m.

3)Change variable noise_scaleto 150, 200, 400, 600, 1000 respectively,re-run the algorithm and plot the polynomialswith the m found in 2). Discuss the impact of noise scale to the accuracy of the returned parameters.[You need to plot a figure like in 1) for each choice of noise_scale.]

4)Change variable number_of_samplesto 40, 30, 20, 10 respectively, re-ran the algorithm and plot the polynomialswith the m found in 2). Discuss the impact of the number of samples to the accuracy of the returned parameters.[You need to plot a figure like in 1) for each choice of number_of_samples.]A simulateddataset will be providedas below.The polynomial used is y = 5 * x + 20 * x2+ x3.Simulated data is given as follows in Python:import matplotlib.pyplot as pltplt.style.use(‘seaborn-whitegrid’)import numpy as npnoise_scale = 100number_of_samples = 50x =  25*(np.random.rand(number_of_samples, 1) -0.8)y = 5 * x + 20 * x**2 + 1 * x**3 + noise_scale*np.random.randn(number_of_samples, 1)plt.plot(x,y,’ro’)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 2 – Apply: Using the Security Rating Scale

Assignment Content

  1. Complete Project 12.1, “Using the Security Rating Scale” from Ch. 12, “Assessing System Security,” of Network Defense and Countermeasures: Principles and Practices.

    Create a well-organized paper with distinct sections.

    • The first should include a security rating based on attractiveness of target, nature of the data and the level of security applied. You should show a rating for each component as well as a total rating for the network. Be sure to describe the reasoning for the rating you scored each component
    • Provide recommendations to improve the overall security score.
    • Since you don’t have detailed information on the campus network, you will need to make some reasonable assumptions on the data a typical college would have and they security controls they would likely have deployed. Do not apply this to your home network.

      Ensure that your document is 2 to 3 pages and includes charts.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Memory management scheme

 Discuss the limitations of memory management schemes in early systems. What were the most problematic aspects of these schemes? Why were they sufficient for the first three generations of computers? 

 

McHoes, Ann and Flynn, Ida.  Understanding Operating Systems, 8th ed., Cengage Learning, 2018

(ISBN 978-1-305-67425-7 )

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cis project management

 

Project Management Presentation

Overview

For this assignment, you will demonstrate your knowledge of the role of project management in information systems and why it is such an important component.

Imagine you are currently working in an information systems field at a small company in which projects have been typically managed by the senior employee working on them without any real plan or specific direction, and each employee has a very different style of management (or lack thereof). The company has recently considered improving in this area and might even consider hiring a project manager or adopting some kind of software or process for managing the project it takes on. There is obviously a need for change, but not everyone is on board. 

In an effort to help everyone see the value of project management improvements, you have been asked to create a presentation on why the company might need a more formalized process for project management. You will need to explain what project management really and why it is such a significant part of information systems work. You will also need to make some recommendations on what types of project management strategies the company might want to adopt. 

Instructions

Your presentation should include:

  • 10–12 slides. 
  • A title slide (not included in the required number of slides).
  • A reference slide (not included in the required number of slides).
  • Three examples of some of the pitfalls that occur in projects when there is no project management.
  • Three examples of how project management can prevent pitfalls when there is no project management.
  • Three examples of how using project management can benefit the creation of an information system.
  • A detailed list of at least three recommendations for project management tools or strategies the company should adopt and an explanation of why those were chosen.
  • Use the Basic Search: Strayer University Online Library to find at least three academic resources. Note: Wikipedia and similar Websites are not considered quality references.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Explain how project management is used to enhance productivity and optimize an organization’s resources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need to solve the Word Count program using Hadoop Streaming following the below instructions

1. In class we wrote a MapReduce program in Java to compute the word counts for any given input. In this assignment, you will repeat solving the same problem but using Hadoop streaming. 

2. Create two scripts in Python namely wordcount_map.py and wordcount_reduce.py to be used by the mappers and reducers of the streaming job. 

3. Your script files must be executable (consider chmod command), and must include the necessary shebang (like in the attached script files).

 4. Attached are the script files we used in class to demonstrate Hadoop streaming, namely: maxtemp_map.py and maxtemp_reduce.py. They can help you to get started. 

5. Recall the streaming command:

 $ mapred streaming \    

 -files <executable_map>,<executable_reduce> \   

  -mapper <executable_map> \    

 -reducer <executable_reduce> \   

  -input <input-path> \    

 -output <output-path> 

(extra options: -combiner, -numReduceTasks, etc.)

MaxTemperature Example file is the program file discussed in Class.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Idle Scan

  1. Explain how the so-called “idle scan” works with nmap. Include example command line commands. According to the nmap website, what hosts are good ones to use for zombies? 100 words minimum.
  2. How do the idle scan and pivoting work to hide the ethical hacker’s assessment? 100 words minimum.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer and network security

 

  1. What things do you think to make up the Web?
  2. When arriving at a crime scene, is it better to shut down the computer immediately or insure it stays on? What are the tradeoffs?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

assessment 1

 In this Assignment, you will use Python and create the numpy portion of the exercise with the information provided. The second half of the exercise is to run the Python Pandas code and record the findings from each step.
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion: Software Development Security

 

Your Task: Develop an “intake” briefing for a group  of software engineers who have been tasked with developing a standard  set of security review processes for virtual teams. The purpose of these  processes is to ensure that compliance for software security  requirements is verified resulting in software applications and  software-based products where security is “built in.” The company also  intends that these processes be used towards the organization’s  achievement of Capability Maturity Model Integration (CMMI) Level 3 —  Defined.

Background: Software development is a complex task,  especially as technology changes at the speed of light, environments  evolve, and more expectations are placed upon vendors who want to be  competitive within the software market. Many software development  organizations also depend upon virtual teams whose members are  geographically dispersed. This complexity also makes implementing and  testing security features (for software applications) much more  challenging.

Format: This week, the format for your deliverable  (posting) will be “Talking Points.” Talking points are presented in  outline format and contain the content that you would put on slides in a  slide deck. Your outline should include 5 to 7 major points (“slide  titles”) followed by 3 to 5 supporting points for each. Remember to put  enough information into the talking points that your peer reviewers can  understand what you intend to cover in each section of your briefing.  Remember to introduce the topic at the beginning, present your analysis,  and then close your briefing with an appropriate summary. Include a  list of sources (3 or more) which attendees could refer to if they wish  to fact check your work.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Sequence Diagrams: Hospital Management System

Sequence diagrams in analysis model the behavior of the system from the user’s viewpoint. Thus, sequence diagrams are a good “whiteboard” technique to capture the various usage scenarios described by users. For this week’s Critical Thinking Assignment, create a sequence diagram of a hospital management system. Include the following notations: actor, object, timeline, focus of control, message, self-message, return message, asynchronous message, object destruction, steps (in a sequence), and notes.

Provide sample pseudocode with your sequence diagram activity.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now