Computer Science
[SOLVED] Cyber Kill Chain
Take the example of an actual rootkit that enters the system through user space identifying the seven steps of the cyber kill chain. Propose a step that would make it even more comprehensive?
[SOLVED] Conversion Methods
Write a paper in which you discuss the various methods that you can use to convert numbers between number bases. Be sure to include a discussion of at least three different conversion methods and provide a conversion example for each method that you explain. You should discuss both converting from base 10 to another type of number base, as well as converting another type of number base to base 10. Include binary to decimal and binary to hexadecimal as two of your conversion examples. In a final paragraph, explain why it is important that you, as an IT professional, understand numeric conversion methods. Assignment Requirements Your paper should be 23 pages in length. Be sure to use appropriate APA format and cite your textbook or other sources that you used in your paper. The paper should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion. For assistance with APA requirements, please go to APA Style Central. You will find the link in the Academic Tools section of the course. Also review the university policy on plagiarism. If you have any questions, please contact your professor.
[SOLVED] Using JASP to Analyse Data
In this assignment, you will need to run analyses on two data sets from JASP.Part OneFirst, open “Fear of Statistics” as the JASP file from computer. This will still be in the “Descriptives” folder. This will run the descriptive statistics and give you access to the code book. For this part of the assignment, you will need to do the following:Use the codebook reading to explain what the data isInclude a screenshot (Links to an external site.) or picture of the codebookChoose four variables to assessUse the codebook to explain what these four variables are/are described as (e.g., what was being measured?)Don’t worry about the reliability statistics!What is the mean for your four chosen variables? How can we read this in terms of the likert scale? (e.g., how do people feel?)Include a screenshot or picture of the output (software’s analysis) of the descriptive statisticsPart TwoNow, open “Invisibility Cloak” as a JASP file from your computer. This will still be in the “T-Tests” folder. It will run the analyses for you and give you the output. For this part of the assignment, you will need to complete the following:Use the codebook reading to explain what the data isInclude a screenshot (Links to an external site.) or picture of the codebookUse the codebook to explain what the variables in the dataset are/are described as (e.g., what was being measured?)Don’t worry about the assumption checks!Explain the results of the T-Test broadlyWhat is the difference between the means?Why is the result not statistically significant?Why is it important to know what the t-test results areInclude a screenshot or picture of the output of the t-test resultsDescribe the descriptive statisticsMake sure to explain what 0 and 1 areWhat does the difference in the mean indicate? (e.g., what is the average for 0 and the average for 1 and what does this tell us for each variable in the context of what these numbers have been assigned to?)Why might we be concerned with the N in this case?Include a screenshot or picture of the output of the descriptive statistics
[SOLVED] Project Description
You will be expected to execute a short research study on one of three areas that were listed as part of project description. They were intended to be separate research topics. In the end I am looking for a report that will document your research activity that will be done in the format we use for Final Technical Reports. 1. What are the technical challenges for implementing Machine Learning in Size, Weight and Power constrained systems like a smartphone? The desire is to provide computationally and power efficient processing at the edge. Format: ANSIS technical report
[SOLVED] Excel Project Instructions
using excel Project Instructions: The project consists of 4 problems and a summary set of questions. For each problem, tom hints and theoretical background is provided. In the following set of problems, r is the standard uniform random value (a continuous random value between 0 and 1). Problem 1 Generate 1000 random values r. For each r generated, calculate the random value ???? by: ???? = ?????????(????), where Ln is the natural logarithm function. Investigate the probability distribution of X by doing the following: 1. Create a relative frequency histogram of X. 2. Select a probability distribution that, in your judgement, is the best fit for X. 3. Support your assertion above by creating a probability plot for X. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background A popular method for generating random values according to a certain probability distribution is to use the inverse transform method. In this method, the cumulative function of the distribution (F(x)) is used for such a random number generation. More specifically, a standard uniform random value r is generated first. Most software environments are capable of generating such a value. In Excel and R, functions =RAND() and runif() generate such a value respectively. After r has been created, it then replaces F(x) in the expression of the cumulative function and the resulting equation is solved for the variable x. For example, suppose we wish to generate a random value according to the exponential distribution with a certain mean (say ?). The cumulative function for the exponential distribution is: ????(????) = ???? ? ???? ? ???? ???? ???? (The quantity 1/? in the above description is called the rate of the exponential random variable and is denoted by ?.) Therefore, to generate a random value x that belongs to the exponential distribution with a mean of ?. We first generate a standard uniform value r, then replace F(x) by r in the above expression, and solve the resulting equation for the variable x: ???? = ???? ? ???? ? ???? ???? ???? ???? ? ???? ???? ???? = ???? ? ???? ? ???? ???? ???? = ????????(???? ? ????) ???? = ????? ????????(???? ? ????) The formula above means that if R is a standard uniform random variable, then the random variable X obtained by the expression ???? = ????? ????????(???? ? ????) will belong to the exponential distribution with an average which is equal to the value of ?. This formula can be simplified as: ???? = ????? ????????(????) (Note that If R is a standard uniform random variable, then (1 ? ????) is also standard uniform.) A special case of the above formula is when ???? = ????. This means that a random variable x generated by the formula ???? = ?????????(????)is an exponential random variable with an average of 1 (or, rate=1). Problem 2 Generate three sets of standard uniform random values, ????????, ????????and ????????, each consisting of 10,000 values. Next, calculate the random value x according to the following formula: ???? = ?????????(????????????????????????). Investigate the probability distribution of X by doing the following: 1. Create a relative frequency histogram of X. 2. Select a probability distribution that, in your judgement, is the best fit for X. 3. Support your assertion above by creating a probability plot for X. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background: This problem is related to a theorem in the probability theory. The theorem states that: If ????????, ????????, , ????????are n identical and independent exponential random variables each with a mean of ?, then the random variable obtained by their sum, that is ???????? + ???????? + + ????????, will have a ????????????????????(????, ????) probability distribution, where n is the shape parameter of the Gamma distribution and ???? = ???? ???????????????? . From the Hints and Theoretical Background of Problem 1, we know that if R is a standard uniform random variable, then ???? = ?????????(????) is an exponential random variable with an average of 1. Therefore, if ???????? , ????????, and ???????? are three independent standard uniform random variables, then ???????? = ?????????(????????)) , ???????? = ?????????(????????), and ???????? = ?????????(????????)are three independent and identical (each with a mean of 1) exponential random variables. Thus, according to the theorem above, the random variable formed by their sum, that is ??????????(????????)? + ??????????(????????)? + (?????????(????????)), will belong to the ????????????????????(????, ????)probability distribution. However algebraically, ??????????(????????)? + ??????????(????????)? + ??????????(????????)? = ??????????(????????) + ????????(????????) + ????????(????????)? = ?????????( ????????????????????????). Therefore, if ???????? , ????????, and ???????? are three independent standard uniform random variables between zero and 1, then the random variable X formed by the formula ???? = ?????????( ????????????????????????) will belong to the ????????????????????(????, ????) probability distribution. Problem 3 Generate a set of 1000 pairs of standard uniform random values ????????and ????????. Then perform the following algorithm for each of these 1000 pairs: Let the output of this algorithm be denoted by Y. Step 1: Generate random values ???????? = ?????????(????????) and ???????? = ?????????(????????) Step 2: Calculate ???? = (?????????????)???? ???? . If ???????? ? ????, then generate a random number ????. If ???? > ????. ???? accept ????????as ????(that is, let ???? = ????????); otherwise if ???? ? ????. ????, else accept ????????? as ???? (that is, let ???? = ?????????). If ???????? < ????, no result is obtained, and the algorithm returns to step 1. This means that the algorithm skips the pair ???????? and ???????? for which ???????? < ???? without generating any result and moves to the next pair ???????? and????????. After repeating the above algorithm 1000 times, a number N of the Y values will be generated. Obviously ???? ? ????????, ???????????? since there will be instances when a pair ???????? and ???????? would not generate any result, and consequently that pair would be wasted. Investigate the probability distribution of ???? by doing the following: 1. Create a relative frequency histogram of ????. 2. Select a probability distribution that, in your judgement, is the best fit for ????. 3. Support your assertion above by creating a probability plot for ????. 4. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 5. In the word document, describe your methodologies and conclusions. 6. In the word document, explain what you have learned from this experiment. Hints and Theoretical Background Other than the inverse transform method used for generating random values that are according to a certain particular probability distribution, a second applied method for generating random values is the Rejection algorithm. The details of this algorithm are explained below: Suppose we wish to generate random values x that is according to a certain probability distribution with ????(????)as its probability density function (pdf). Also suppose that the following two conditions are satisfied (i) we are able to generate random values y that belong to a probability distribution whose probability density function is ????(????), (ii) there exists a positive constant C such that ????(????) ????(????) ? ???? for all y values (this means that the ratio (????(????) ????(????) ) is always bounded and does not grow indefinitely. This condition is almost always satisfied for any two probability density functions ????(????) and ????(????)). The rejection algorithm can now be implemented as follows: Step 1: Generate a random value y that belongs to the probability distribution with ????(????) as its pdf and generate a standard uniform random value r. Step 2: Evaluate ???? = ????(????) ???? ????(????) . If ???? ? ????, then accept y as the random variable x (that is, let ???? = ????); otherwise return to Step1 and try another pair of (???? , ????) values. A few remarks about the Rejection algorithm is worth noting: 1. The probability that the generated y value will be accepted as x, is: ????(????) ???? ????(????) . This is the reason why the algorithm uses a standard uniform value r and accepts y as x if ???? ? ????(????) ???? ????(????) . 2. Each iteration of the algorithm will independently result in an accepted value with a probability equal to: ???? ????? ? ????(????) ???? ????(????) ? = ???? ???? . Therefore, the number of iterations needed to generate one accepted y value follows a geometric probability distribution with mean C. Relevancy of Problem 3 to the Rejection Algorithms: In problem 3, the random variable y , selected from an exponential probability distribution with rate =1 and a pdf of ????(????) = ?????????, is used to first generate the absolute value of a standard normal random variable x (|????|has the pdf: ????(????) = ???? ????????? ????????????? ???? ), and then assign positive or negative signs to this value (through a standard uniform variable r) in order to obtain a standard normal random value. It can be shown algebraically that ????(????) ????(????) = ????????? ???? ???? ? (?????????)???? ???? ? ????????? ???? for all y values (note that ???? ?(?????????)???? ???? ? ???? for all y values). Therefore, the constant C in the assumptions of the algorithm can be chosen to be: ???? = ????????? ???? ? ????. ????????????. Therefore, ????(????) ???? ????(????) = ???? ? (?????????)???? ???? . Hence the following algorithm can be used to generate the absolute value of a standard normal random variable: Step 1: Generate random variables Y and R; with Y being exponential with ????ate=1, and R being uniform on (????, ????) Step 2: If ???? ? ???? ? (?????????)???? ???? , then accept Y as the random variable X (that is, set ???? = ????); otherwise return to Step1 and try another pair of (???? ,????) values. Note that in step 2 of the above algorithm, the condition ???? ? ???? ? (?????????)???? ???? is mathematically equivalent to: ?????????(????) ? (?????????)???? ???? . However, we have already seen in the Hints and Theoretical Backgrounds of the earlier problems that if R is standard uniform, then ?????????(????) is exponential with rate=1. Therefore, the algorithm for generating the absolute value of the standard normal random variable can be modified as follows: Step 1: Generate independent exponential random variables ???????? and ????????; each with ????ate=1. Step 2: Evaluate ???? = (?????????????)???? ???? 2. If ???? ? ????????, then accept ???????? as the random variable X (that is, set ???? = ????????); otherwise return to Step1 and try another pair of (???????? , ????????) values. In fact, it is the above version of the Rejection algorithm that is being implemented in Problem 3. However, in order to obtain a standard normal random value (instead of its absolute value), the step 2 of the above algorithm has been modified as follows: Step 2: Evaluate ???? = (?????????????)???? ???? . If ???? ? ????????, then generate a standard uniform variable R. If ???? ? ????. ????, set ???? = ????????, otherwise set ???? = ?????????. If ???? > ????????, return to step 1 and try another pair of (???????? , ????????) values Note: The standard normal random value generated by the Rejection algorithm can be used to generate any normal random value with a mean ? and a standard deviation ?. Once a standard normal variable Z has been generated, it suffices to evaluate ???? + ???????? to generate the desired normal variable. Problem 4 In the algorithm of problem #3 above, there are instances when the generated random values do not satisfy the condition ???????? ? ???? In order to obtain an acceptable value for ????. In such cases, the algorithm returns to step 1 and generates another two values to check for acceptance. Let ???? be the number of iterations needed to generate ???? of the accepted ???? values (???? ? ????). Let ???? = ???? ???? . (For example, suppose that the algorithm has produced 700 ???? values (???? = ????????????) after 1000 iterations (???? = ????????????????). Then ???? = ???????????????? ???????????? = ????. ????????. This means that it takes the algorithm 1.43 iterations to produce one output. In fact, ???? itself is a random variable. Theoretically, ????(????) – the expected value (i.e., average) of ???? of an algorithm is a measure of efficiency of that algorithm.) Investigate ???? by the following sequence of exploratory data analytic methods: 1. Estimate the expected value and the standard deviation of ????. 2. Select a probability distribution that, in your judgement, is the best fit for ????. 3. Support your assertion above by performing a Chi-squared test of best fit with a 0.05 level of significance. 4. As the number of iterations ???? becomes larger, the values ???? will approach a certain limiting value. Investigate this limiting value of ???? by completing the following table and plotting ???? versus ????. What value do you propose for the limiting value that ???? approaches to? M W 10 20 30 40 50 60 70 80 90 100 200 300 400 500 600 700 800 900 1000 5. In the word document, communicate to the reader your findings about ????. 6. In the word document, explain what you have learned from this experiment. Summary In the word document, summarize and conceptualize your findings in parts 1 4 above by filling the blanks in the sentences below: 1. If ???? is a standard uniform random variable, then ?????????(????) has the ___________________ probability distribution. 2. The sum of three independent and identically distributed _________________ random variables has the ________________________ probability distribution. 3. The output of the algorithm of problem 3 has a ______________________ probability distribution. 4. In step 2 of the algorithm of problem 3, random variables ???????? and ???????? , each of whose probability distribution is ________________________ are used to generate a random value ???? that has the _______________________probability distribution. 5. The random value ???? that was discussed in problem 4, has the ____________________________ probability distribution. The expected value of ???? is: __________.
[SOLVED] Organizations Need for Physical Security
Discuss an organizations need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.
[SOLVED] Virtual Reality Is More Than Just For Fun
This should be an argumentative essay in Computer Science. You should provide specific arguments how can virtual reality be useful and then you should make a conclusion on the basis of these arguments that “virtual reality is more than just for fun” 1. Use scientific!!! language and academic vocabulary!! 2. No passive voice, no jargon, no personal nouns, no idioms 3.Use 3 scientific sources (two of them should be published between 2015-2020)!! Academic journals and articles. include page numbers Structure: why the problem of virtual reality is important? Analyze its perspectives and positive outcomes for humanity. Be specific!!! Conclusion.
[SOLVED] Information Systems Security Policies
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside attack on the internal network. They specialize in building secure firewalls as well as complex intrusion detection systems designed to eep intruders out. They watch and monitor the incoming message traffic very closely. But no matter how well they prkotect the private network from outside access without proper authority, they do not help prevent an attack by a malicious or disgruntled employee from the inside. And they cannot prevent breaches due to a simple lack of understanding of security policy by internal employees.When do YOU think an organization needs information systems security policies? Why?
[SOLVED] An Epidemic Feedback Model
Curtailing virus propagation of a search engine in social networks. Question: What will be the impact of virus propagation wormhole of a search engine in social networks like Facebook and Instagram? Attach is a summary of my proposal containing my research topic and question, the value and justification. Also attached is the guide to this proposal and should be followed strictly, there is also a similar material in pdf format that is attached to also help the writer aside the additional resources he or she will be using for this writing. Please note that only those with Cyber Security and computing expertise are to work on this paper.
[SOLVED] Physical Security Plan Presentation
Presenting a Physical Security Plan. Your team represents a small tech firm and you are tasked with making your firms proposal to a local _____________________ firm regarding their network policies and procedures. Your proposal will be presented in the form of a PowerPoint presentation (20 slides) The presentation must include: Title Slide with details about the company that you are presenting to on the Notes Pages of the Title slide “About Us” slide about your company (Company name/logo, etc) Our Proposal/Our Goal Results of your imaginary Needs Assessment of the company) Policies & Procedures recommended Give details/specifics: Physical Security: switch to keyless entry and badges Areas to include: Design Asset management Security including policies Risk management Bibliography Slide (list minimum of 2 sources)
Use Promo Code: FIRST15