Artificial Neural

Discussion and exercises:Chapter 5:· Discussion 1: What is an artificial neural network and for what types of problems can it be used?· Discussion 2: Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?· Discussion 3: What are the most common ANN architectures? For what types of problems can they be used?· Discussion 4: ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.· Exercise 6: Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.Chapter 6· Discussion 1: What is deep learning? What can deep learning do that traditional machine-learning methods cannot?· Discussion 2: List and briefly explain different learning paradigms/ methods in AI.· Discussion 3: What is representation learning, and how does it relate to machine learning and deep learning?· Discussion 4: List and briefly describe the most commonly used ANN activation functions.· Discussion 5: What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.· Exercise 4: Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.Your paper should meet these requirements:· Minimum 5 pages length, not including the required cover page and reference page. Also do not include questions, just number and the answer.· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.

Read more

Modern Multimedia

Explain the origin and evolution of modern multimedia.

Read more

Microcomputer Industry

Read the Case Study: ) K. M. Eisenhardt, and L. J. Bourgeois, ‘‘Politics of Strategic Decision Making in High-Velocity Environments: Toward a Midrange Theory,’’ Academy of Management Journal 31 (1988): 737–770.Answer this question: How does judicial issues influence the strategic decisions of the microcomputer industry?Write a 2-page paper use APA format and adhere to the writing rubric.

Read more

A Substantive Posting

Week 11: Discussion Posting – Readings: The purpose of this discussion postings is for students to read the assigned textbook chapters (APA Ch. #7, APA Ch. #8), synthesize the information, and then critically think and share the information with other students using their own words.Note : Provide introduction posting and response postings by clicking on the “Discussion” tab at the course web page.Initial Posting (Thursday): The assignment requires students to read the week’s assigned reading requirements (APA Ch. #7, APA Ch. #8), then post a summary of four (4) interesting facts that they learned from the reading of “each” assigned chapter using their own words by the Saturday due date. Direct quotes are not acceptable.The initial postings must be substantively provided with a minimum of four paragraphs for each textbook chapter – one paragraph for each interesting fact from each assigned reading – if two (2) chapters, then a total of eight (8) paragraphs/facts (four (4) for each chapter). Each paragraph must contain a minimum of three (3) robust sentences. CAUTION: It is not appropriate to make postings like “I found the information on XXXX to be interesting” as this is not a substantive posting. The postings must be provided informing the reader that you understand the interesting facts you are posting – as if you are teaching the reader about the interesting fact. Remember that these postings must be in your own words.

Read more

Applicable Personal Experience

Write a discussion post on following three topics. Each one should be in a separate file, each post should have 2 (scholarly) journal citations, min 300 words each, additional requirements also specified below:Discussion 1:Watch the following video: www.youtube.com/watch?v=GHc63Xgc0-8Answer the following:What are your takeaways from these videos?How can you prepare for the day when indeed humans may not need to apply for many jobs?What are the pros and cons of UBI and SIS?Discussion 2):Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.Run you submission through grammar check before submitting.At least 2 (scholarly) journal source should be used for each post.Make your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

Network Security Exploits

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.Below is a list of common security exploits and attacks. Review the list1. Replay Attacks2. Insertion Attacks3. Fragmentation Attacks4. Buffer Overflow Attacks5. XSS Attacks6. Man-in-the-Middle Attacks7. Hijacking Attacks8. Spoofing Attacks9. Covert Channels10. DoS11. DDoS12. Botnet Attacks13. Social Engineering AttacksDecide which attack you consider to be the worse kind.· List the attack’s name you selected.· Explain your reasons for determining this to be the worst kind of attack.· Locate an incident in which the attack was used to exploit an organization.· List the URL and describe the attack.· Provide the outcome, was the attack successful or foiled.· What steps were taken (or should be taken) to circumvent this type of attack from happening again?

Read more

A picture is worth a Thpousand Words

“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide a brief description of your choices and explain why you made your choices. Also, describe what advantage your choices have over the others. 

Read more

History of Cryptography

evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.

Read more

Data Encryption Standard

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.

Read more

Economic Damage

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information