Pneumonia and Breast Cancer

need to write a python code. carried out all the experiments using a public dataset,  compare the results with state of the art techniques state the novelty of the work etc. should be a complete research article ready for publication in high-rank journals like IEEE, Springer with impact factor  3. pneumonia or breast cancer detection from medical images using deep learning with python.

Read more

Fundamentals of Data Analytics

The police chief asks you to analyze the logs from emergency 911 calls in the city and then provide a summary of that data. A.  Prepare a dataset from the data provided in the “Raw Data” spreadsheet, attached below. Remove any potential errors or outliers, duplicate records, or data that are not necessary. Provide a clean copy of the data in your submission. B.  Explain why you removed each column and row from the “Raw Data” spreadsheet, or why you imputed data in empty fields as you prepared the data for analysis. C.  Create data sheets using your cleaned dataset, provide each  of the following to represent the requested aggregated data. •  table: date and number of events •  bar graph: date and number of events •  table: number of incident occurrences by event type •  bar graph: number of incident occurrences by event type •  table: sectors and number of events •  bar graph: sectors and number of events   D.  Summarize your observations from reviewing the data sheets you have created   Part 2: The state governor has offered an additional funding incentive for police departments that are able to meet the standard of having a minimum of 2.5 officers onsite per incident. The police department has asked you to analyze their data to determine if the department will be eligible for additional funding, using the attached linear regression.   E.  Describe the fit of the linear regression line to the data, providing graphical representations or tables as evidence to support your description. F.  Describe the impact of the outliers on the regression model, providing graphical representations or tables as evidence to support your description.   G.  Create a residual plot and explain how to improve the linear regression model based on your interpretation of the plot.   H.  Using the linear regression analysis, explain if the department qualifies for additional state funding, including any limitations posed by the available data to the assessment of the department’s current funding eligibility.   I.  Describe the precautions or behaviors that should be exercised when working with and communicating about the sensitive data in this scenario.   J.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.   K.  Demonstrate professional communication in the content and presentation of your submission.

Read more

Secure Network Connection

In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

Read more

Green Initiatives and Sustainability

A growing trend is a concept of supporting green initiatives and sustainability. It is now becoming easier to support these initiatives with mobile apps that support green lifestyles. Search the Internet and write a short paper (400-500 words, not including in-text citations and reference list) identifying at least five mobile apps that will help you go green. Give a brief explanation describing the functionality that each app provides. Suggested Websites https://science.howstuffworks.com/environmental/green-tech/sustainable/5-green-mobile-apps.htm https://www.triplepundit.com/story/2015/5-apps-help-people-live-more-sustainable-life/33101 https://www.huffpost.com/entry/5-apps-to-help-you-live-a_b_5849740 https://www.activesustainability.com/sustainable-life/top-10-apps-for-sustainable-living/

Read more

Firewall

List three design goals for a firewall. List four techniques used by firewalls to control access and enforce a security policy. What information is used by a typical packet filtering firewall? What are some weaknesses of a packet filtering firewall? What is the difference between a packet filtering firewall and a stateful inspection firewall? What is an application-level gateway? What is a circuit-level gateway? What are the common characteristics of a bastion host? Why is it useful to have host-based firewalls? What is a DMZ network and what types of systems would you expect to find on such networks? What is the difference between an internal and an external firewall?

Read more

IDS and IPS Tools

What is the effectiveness of IDS/IPS tools on actually detecting/preventing an attacker? Are they worth installing for network defence? Why or why not?

Read more

Post-Exploitation Attack Tools

Select a post-exploitation attack tool that may be used by an attacker. Explain how the tool works and how a defender may prevent and detect this tool from being successful. 

Read more

Classes of Intruders

List and briefly define three classes of intruders. What are two common techniques used to protect a password file? What are three benefits that can be provided by an intrusion detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection? What metrics are useful for profile-based intrusion detection? What is the difference between rule-based anomaly detection and rule-based penetration identification? What is a honeypot? What is salt in the context of UNIX password management? List and briefly define four techniques used to avoid guessable passwords.

Read more

RFC 5321 and RFC 5322

What is the difference between RFC 5321 and RFC 5322? What are the SMTP and MIME standards? What is the difference between a MIME content type and a MIME transfer encoding? Briefly explain base64 encoding. Why is base64 conversion useful for an e-mail application? What is S/MIME? What are the four principal services provided by S/MIME? What is the utility of a detached signature? What is DKIM?

Read more

Access Control List

Explain the difference between an access control list (ACL) that is used in routers to block traffic and how a firewall blocks traffic.  What similarities do they share?  

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information