[ORDER SOLUTION] Enterprise System Implementation

Business benefits for Enterprise system implementation • Introduction – About Enterprise Systems ; Examples of Enterprise System – SAP, Oracle, Sales force • ES implementation – Best Practice, ES applications/Vendors • Business Benefits i) Managing Supply Chain ii) Transformation of business iii) New strategies, Process tracking/ Control measures iv) Financial management & analysis v) Demand management, Resource management vi) Customization according to customer/business needs vii) Return of Investment • Industry Level ES implementation standards • Conclusion • References Note : The above topic have to be covered any addition to the above is good to have please do not abstain yourself in exploring more and include the same .

Read more

[ORDER SOLUTION] Data Breach Management

In this day and age, data breaches have increased in quantity and intensity. Therefore, it is essential that the security professional assess situations which could threaten the security of an organization’s intellectual property. Students will then gain the knowledge, tools, and resources to recognize and mitigate real time attacks. Research a data breach, ransomware, or data exfiltration attack that has occurred within the last 6 months that successfully compromised an organization. In 500-750 words, address the following: Describe in detail how the attacker made the breach. Specifically, how was the attacker able to get in and out of the system? What was the threat vector? Explain what the attacker did during the breach. Describe the effects of the attack on the various stakeholders. Be sure to include non-technical elements of the entire corporation (e.g., public relations, marketing, and/or sales). Prepare this assignment according to the guidelines found in the APA Style Guide 6th ed

Read more

[ORDER SOLUTION] Mobile Security

Select one of these papers on mobile, wireless, or IOT security (Links to an external site.). (Login with USF Office365 account). Provide the following: Reference of the paper (title, authors, etc.) Summary of the major research findings of the paper in your own words. Did you think the research is well-done and/or useful? Why or why not? Do you believe this research has applications to the real-world? Why or why not? What were the strengths of this paper? What were the weaknesses of this paper? Do you agree with the conclusions of the authors? Why or why not? What would be some additional research areas that could be added on to this paper? For example, if the research got the authors only to a certain point, what more needs to be done in the field of inquiry to advance our knowledge and understanding in this area? Area there any related papers/research out there? What are they? Finally, do you recommend this paper to others? Why or why not? Submit your report via this link. Your paper should be: Double spaced, one inch margins, Times New Roman 12 point. Include any cited references Length under 10 pages.

Read more

[ORDER SOLUTION] Excel Project Instructions

using excel Project Instructions: The project consists of 4 problems and a summary set of questions. For each problem, tom hints and theoretical background is provided. In the following set of problems, r is the standard uniform random value (a continuous random value between 0 and 1). Problem 1 Generate 1000 random values r. For each r generated, calculate the random value ???? by: ???? = ?????????(????), where “Ln“ is the natural logarithm function. Investigate the probability distribution of X by doing the following: 1. Create a relative frequency histogram of X. 2. Select a probability distribution that, in your judgement, is the best fit for X. 3. Support your assertion above by creating a probability plot for X. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background A popular method for generating random values according to a certain probability distribution is to use the inverse transform method. In this method, the cumulative function of the distribution (F(x)) is used for such a random number generation. More specifically, a standard uniform random value r is generated first. Most software environments are capable of generating such a value. In Excel and R, functions “=RAND()” and “runif()” generate such a value respectively. After r has been created, it then replaces F(x) in the expression of the cumulative function and the resulting equation is solved for the variable x. For example, suppose we wish to generate a random value according to the exponential distribution with a certain mean (say ?). The cumulative function for the exponential distribution is: ????(????) = ???? ? ???? ? ???? ???? ???? (The quantity 1/? in the above description is called the rate of the exponential random variable and is denoted by ?.) Therefore, to generate a random value x that belongs to the exponential distribution with a mean of ?. We first generate a standard uniform value r, then replace F(x) by r in the above expression, and solve the resulting equation for the variable x: ???? = ???? ? ???? ? ???? ???? ???? ???? ? ???? ???? ???? = ???? ? ???? ? ???? ???? ???? = ????????(???? ? ????) ???? = ????? ????????(???? ? ????) The formula above means that if R is a standard uniform random variable, then the random variable X obtained by the expression ???? = ????? ????????(???? ? ????) will belong to the exponential distribution with an average which is equal to the value of ?. This formula can be simplified as: ???? = ????? ????????(????) (Note that If R is a standard uniform random variable, then (1 ? ????) is also standard uniform.) A special case of the above formula is when ???? = ????. This means that a random variable x generated by the formula ???? = ?????????(????)is an exponential random variable with an average of 1 (or, rate=1). Problem 2 Generate three sets of standard uniform random values, ????????, ????????and ????????, each consisting of 10,000 values. Next, calculate the random value x according to the following formula: ???? = ?????????(????????????????????????). Investigate the probability distribution of X by doing the following: 1. Create a relative frequency histogram of X. 2. Select a probability distribution that, in your judgement, is the best fit for X. 3. Support your assertion above by creating a probability plot for X. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background: This problem is related to a theorem in the probability theory. The theorem states that: If ????????, ????????, … , ????????are n identical and independent exponential random variables each with a mean of ?, then the random variable obtained by their sum, that is ???????? + ???????? + … + ????????, will have a ????????????????????(????, ????) probability distribution, where n is the shape parameter of the Gamma distribution and ???? = ???? ???????????????? . From the Hints and Theoretical Background of Problem 1, we know that if R is a standard uniform random variable, then ???? = ?????????(????) is an exponential random variable with an average of 1. Therefore, if ???????? , ????????, and ???????? are three independent standard uniform random variables, then ???????? = ?????????(????????)) , ???????? = ?????????(????????), and ???????? = ?????????(????????)are three independent and identical (each with a mean of 1) exponential random variables. Thus, according to the theorem above, the random variable formed by their sum, that is ??????????(????????)? + ??????????(????????)? + (?????????(????????)), will belong to the ????????????????????(????, ????)probability distribution. However algebraically, ??????????(????????)? + ??????????(????????)? + ??????????(????????)? = ??????????(????????) + ????????(????????) + ????????(????????)? = ?????????( ????????????????????????). Therefore, if ???????? , ????????, and ???????? are three independent standard uniform random variables between zero and 1, then the random variable X formed by the formula ???? = ?????????( ????????????????????????) will belong to the ????????????????????(????, ????) probability distribution. Problem 3 Generate a set of 1000 pairs of standard uniform random values ????????and ????????. Then perform the following algorithm for each of these 1000 pairs: Let the output of this algorithm be denoted by Y. Step 1: Generate random values ???????? = ?????????(????????) and ???????? = ?????????(????????) Step 2: Calculate ???? = (?????????????)???? ???? . If ???????? ? ????, then generate a random number ????. If ???? > ????. ???? accept ????????as ????(that is, let ???? = ????????); otherwise if ???? ? ????. ????, else accept ????????? as ???? (that is, let ???? = ?????????). If ???????? < ????, no result is obtained, and the algorithm returns to step 1. This means that the algorithm skips the pair ???????? and ???????? for which ???????? < ???? without generating any result and moves to the next pair ???????? and????????. After repeating the above algorithm 1000 times, a number N of the Y values will be generated. Obviously ???? ? ????????, ???????????? since there will be instances when a pair ???????? and ???????? would not generate any result, and consequently that pair would be wasted. Investigate the probability distribution of ???? by doing the following: 1. Create a relative frequency histogram of ????. 2. Select a probability distribution that, in your judgement, is the best fit for ????. 3. Support your assertion above by creating a probability plot for ????. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background Other than the inverse transform method used for generating random values that are according to a certain particular probability distribution, a second applied method for generating random values is the Rejection algorithm. The details of this algorithm are explained below: Suppose we wish to generate random values x that is according to a certain probability distribution with ????(????)as its probability density function (pdf). Also suppose that the following two conditions are satisfied (i) we are able to generate random values y that belong to a probability distribution whose probability density function is ????(????), (ii) there exists a positive constant C such that ????(????) ????(????) ? ???? for all y values (this means that the ratio (????(????) ????(????) ) is always bounded and does not grow indefinitely. This condition is almost always satisfied for any two probability density functions ????(????) and ????(????)). The rejection algorithm can now be implemented as follows: Step 1: Generate a random value y that belongs to the probability distribution with ????(????) as its pdf and generate a standard uniform random value r. Step 2: Evaluate ???? = ????(????) ???? ????(????) . If ???? ? ????, then accept y as the random variable x (that is, let ???? = ????); otherwise return to Step1 and try another pair of (???? , ????) values. A few remarks about the Rejection algorithm is worth noting: 1. The probability that the generated y value will be accepted as x, is: ????(????) ???? ????(????) . This is the reason why the algorithm uses a standard uniform value r and accepts y as x if ???? ? ????(????) ???? ????(????) . 2. Each iteration of the algorithm will independently result in an accepted value with a probability equal to: ???? ????? ? ????(????) ???? ????(????) ? = ???? ???? . Therefore, the number of iterations needed to generate one accepted y value follows a geometric probability distribution with mean C. Relevancy of Problem 3 to the Rejection Algorithms: In problem 3, the random variable y , selected from an exponential probability distribution with rate =1 and a pdf of ????(????) = ?????????, is used to first generate the absolute value of a standard normal random variable x (|????|has the pdf: ????(????) = ???? ????????? ????????????? ???? ), and then assign positive or negative signs to this value (through a standard uniform variable r) in order to obtain a standard normal random value. It can be shown algebraically that ????(????) ????(????) = ????????? ???? ???? ? (?????????)???? ???? ? ????????? ???? for all y values (note that ???? ?(?????????)???? ???? ? ???? for all y values). Therefore, the constant C in the assumptions of the algorithm can be chosen to be: ???? = ????????? ???? ? ????. ????????????. Therefore, ????(????) ???? ????(????) = ???? ? (?????????)???? ???? . Hence the following algorithm can be used to generate the absolute value of a standard normal random variable: Step 1: Generate random variables Y and R; with Y being exponential with ????ate=1, and R being uniform on (????, ????) Step 2: If ???? ? ???? ? (?????????)???? ???? , then accept Y as the random variable X (that is, set ???? = ????); otherwise return to Step1 and try another pair of (???? ,????) values. Note that in step 2 of the above algorithm, the condition ???? ? ???? ? (?????????)???? ???? is mathematically equivalent to: ?????????(????) ? (?????????)???? ???? . However, we have already seen in the Hints and Theoretical Backgrounds of the earlier problems that if R is standard uniform, then ?????????(????) is exponential with rate=1. Therefore, the algorithm for generating the absolute value of the standard normal random variable can be modified as follows: Step 1: Generate independent exponential random variables ???????? and ????????; each with ????ate=1. Step 2: Evaluate ???? = (?????????????)???? ???? 2. If ???? ? ????????, then accept ???????? as the random variable X (that is, set ???? = ????????); otherwise return to Step1 and try another pair of (???????? , ????????) values. In fact, it is the above version of the Rejection algorithm that is being implemented in Problem 3. However, in order to obtain a standard normal random value (instead of its absolute value), the step 2 of the above algorithm has been modified as follows: Step 2: Evaluate ???? = (?????????????)???? ???? . If ???? ? ????????, then generate a standard uniform variable R. If ???? ? ????. ????, set ???? = ????????, otherwise set ???? = ?????????. If ???? > ????????, return to step 1 and try another pair of (???????? , ????????) values Note: The standard normal random value generated by the Rejection algorithm can be used to generate any normal random value with a mean ? and a standard deviation ?. Once a standard normal variable Z has been generated, it suffices to evaluate ???? + ???????? to generate the desired normal variable. Problem 4 In the algorithm of problem #3 above, there are instances when the generated random values do not satisfy the condition ???????? ? ???? In order to obtain an acceptable value for ????. In such cases, the algorithm returns to step 1 and generates another two values to check for acceptance. Let ???? be the number of iterations needed to generate ???? of the accepted ???? values (???? ? ????). Let ???? = ???? ???? . (For example, suppose that the algorithm has produced 700 ???? values (???? = ????????????) after 1000 iterations (???? = ????????????????). Then ???? = ???????????????? ???????????? = ????. ????????. This means that it takes the algorithm 1.43 iterations to produce one output. In fact, ???? itself is a random variable. Theoretically, ????(????) – the expected value (i.e., average) of ???? – of an algorithm is a measure of efficiency of that algorithm.) Investigate ???? by the following sequence of exploratory data analytic methods: 1. Estimate the expected value and the standard deviation of ????. 2. Select a probability distribution that, in your judgement, is the best fit for ????. 3. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 4. As the number of iterations ???? becomes larger, the values ???? will approach a certain limiting value. Investigate this limiting value of ???? by completing the following table and plotting ???? versus ????. What value do you propose for the limiting value that ???? approaches to? M W 10 20 30 40 50 60 70 80 90 100 200 300 400 500 600 700 800 900 1000 5. In the word document, communicate to the reader your findings about ????. 6. In the word document, explain what you have learned from this experiment. Summary In the word document, summarize and conceptualize your findings in parts 1 – 4 above by filling the blanks in the sentences below: 1. If ???? is a standard uniform random variable, then ?????????(????) has the ___________________ probability distribution. 2. The sum of three independent and identically distributed _________________ random variables has the ________________________ probability distribution. 3. The output of the algorithm of problem 3 has a ______________________ probability distribution. 4. In step 2 of the algorithm of problem 3, random variables ???????? and ???????? , each of whose probability distribution is ________________________ are used to generate a random value ???? that has the _______________________probability distribution. 5. The random value ???? that was discussed in problem 4, has the ____________________________ probability distribution. The expected value of ???? is: __________.

Read more

[ORDER SOLUTION] Computer Literacy Microsoft Word

Now that you have been introduced to some advanced features in Microsoft Word, you will teach the class an advanced skill in it. In this discussion, select at least one advanced feature of Microsoft Word and, using your own words (no copying and pasting) and examples, teach your classmates this skill. Check the posts on the discussion board to choose something no one else has shared yet! Summarize what this is used to accomplish and explain the steps to accomplish it. Share where you found this in the course external resource sections, online lectures, or supplemental materials, so others can review it and be specific about where you learned this. Attach a Word document demonstrating the skill you selected. Name the document you share W2D_LastName. Format your document in APA format using the skills you are learning in Week 2. Remember that in the lecture on Creating an APA Title Page, we provided a sample Word document in APA format that you can customize, including the references section. Also, the lecture on Creating an APA References Page contains supplemental materials on how to create AP citations and references. Share any challenges you had while demonstrating these techniques or any tips for others. Were there any tools or functions in Microsoft Word that you weren’t able to figure out or want to know more about? Share them and perhaps someone else can help.

Read more

[ORDER SOLUTION] Project Description

You will be expected to execute a short research study on one of three areas that were listed as part of project description. They were intended to be separate research topics. In the end I am looking for a report that will document your research activity that will be done in the format we use for Final Technical Reports. 1. What are the technical challenges for implementing Machine Learning in Size, Weight and Power constrained systems like a smartphone? The desire is to provide computationally and power efficient processing at the edge. Format: ANSIS technical report

Read more

[ORDER SOLUTION] An Epidemic Feedback Model

 Curtailing virus propagation of a search engine in social networks. Question: What will be the impact of virus propagation wormhole of a search engine in social networks like Facebook and Instagram? Attach is a summary of my proposal containing my research topic and question, the value and justification. Also attached is the guide to this proposal and should be followed strictly, there is also a similar material in pdf format that is attached to also help the writer aside the additional resources he or she will be using for this writing. Please note that only those with Cyber Security and computing expertise are to work on this paper.

Read more

[ORDER SOLUTION] Information Systems Security Policies

Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside attack on the internal network. They specialize in building secure firewalls as well as complex intrusion detection systems designed to eep intruders out. They watch and monitor the incoming message traffic very closely. But no matter how well they prkotect the private network from outside access without proper authority, they do not help prevent an attack by a malicious or disgruntled employee from the inside. And they cannot prevent breaches due to a simple lack of understanding of security policy by internal employees.When do YOU think an organization needs information systems security policies? Why?

Read more

[ORDER SOLUTION] Virtual Reality Is More Than Just For Fun

This should be an argumentative essay in Computer Science. You should provide specific arguments how can virtual reality be useful and then you should make a conclusion on the basis of these arguments that “virtual reality is more than just for fun” 1. Use scientific!!! language and academic vocabulary!! 2. No passive voice, no jargon, no personal nouns, no idioms 3.Use 3 scientific sources (two of them should be published between 2015-2020)!! Academic journals and articles. include page numbers Structure: why the problem of virtual reality is important? Analyze its perspectives and positive outcomes for humanity. Be specific!!! Conclusion.

Read more

[ORDER SOLUTION] Organization’s Need for Physical Security

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information