Computer Science
Pneumonia and Breast Cancer
need to write a python code. carried out all the experiments using a public dataset, compare the results with state of the art techniques state the novelty of the work etc. should be a complete research article ready for publication in high-rank journals like IEEE, Springer with impact factor 3. pneumonia or breast cancer detection from medical images using deep learning with python.
Fundamentals of Data Analytics
The police chief asks you to analyze the logs from emergency 911 calls in the city and then provide a summary of that data. A. Prepare a dataset from the data provided in the Raw Data spreadsheet, attached below. Remove any potential errors or outliers, duplicate records, or data that are not necessary. Provide a clean copy of the data in your submission. B. Explain why you removed each column and row from the Raw Data spreadsheet, or why you imputed data in empty fields as you prepared the data for analysis. C. Create data sheets using your cleaned dataset, provide each of the following to represent the requested aggregated data. table: date and number of events bar graph: date and number of events table: number of incident occurrences by event type bar graph: number of incident occurrences by event type table: sectors and number of events bar graph: sectors and number of events D. Summarize your observations from reviewing the data sheets you have created Part 2: The state governor has offered an additional funding incentive for police departments that are able to meet the standard of having a minimum of 2.5 officers onsite per incident. The police department has asked you to analyze their data to determine if the department will be eligible for additional funding, using the attached linear regression. E. Describe the fit of the linear regression line to the data, providing graphical representations or tables as evidence to support your description. F. Describe the impact of the outliers on the regression model, providing graphical representations or tables as evidence to support your description. G. Create a residual plot and explain how to improve the linear regression model based on your interpretation of the plot. H. Using the linear regression analysis, explain if the department qualifies for additional state funding, including any limitations posed by the available data to the assessment of the departments current funding eligibility. I. Describe the precautions or behaviors that should be exercised when working with and communicating about the sensitive data in this scenario. J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. K. Demonstrate professional communication in the content and presentation of your submission.
Secure Network Connection
In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network. How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution? Respond to two other learners by the end of the week.
Green Initiatives and Sustainability
A growing trend is a concept of supporting green initiatives and sustainability. It is now becoming easier to support these initiatives with mobile apps that support green lifestyles. Search the Internet and write a short paper (400-500 words, not including in-text citations and reference list) identifying at least five mobile apps that will help you go green. Give a brief explanation describing the functionality that each app provides. Suggested Websites https://science.howstuffworks.com/environmental/green-tech/sustainable/5-green-mobile-apps.htm https://www.triplepundit.com/story/2015/5-apps-help-people-live-more-sustainable-life/33101 https://www.huffpost.com/entry/5-apps-to-help-you-live-a_b_5849740 https://www.activesustainability.com/sustainable-life/top-10-apps-for-sustainable-living/
Firewall
List three design goals for a firewall. List four techniques used by firewalls to control access and enforce a security policy. What information is used by a typical packet filtering firewall? What are some weaknesses of a packet filtering firewall? What is the difference between a packet filtering firewall and a stateful inspection firewall? What is an application-level gateway? What is a circuit-level gateway? What are the common characteristics of a bastion host? Why is it useful to have host-based firewalls? What is a DMZ network and what types of systems would you expect to find on such networks? What is the difference between an internal and an external firewall?
IDS and IPS Tools
What is the effectiveness of IDS/IPS tools on actually detecting/preventing an attacker? Are they worth installing for network defence? Why or why not?
Post-Exploitation Attack Tools
Select a post-exploitation attack tool that may be used by an attacker. Explain how the tool works and how a defender may prevent and detect this tool from being successful.
Classes of Intruders
List and briefly define three classes of intruders. What are two common techniques used to protect a password file? What are three benefits that can be provided by an intrusion detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection? What metrics are useful for profile-based intrusion detection? What is the difference between rule-based anomaly detection and rule-based penetration identification? What is a honeypot? What is salt in the context of UNIX password management? List and briefly define four techniques used to avoid guessable passwords.
RFC 5321 and RFC 5322
What is the difference between RFC 5321 and RFC 5322? What are the SMTP and MIME standards? What is the difference between a MIME content type and a MIME transfer encoding? Briefly explain base64 encoding. Why is base64 conversion useful for an e-mail application? What is S/MIME? What are the four principal services provided by S/MIME? What is the utility of a detached signature? What is DKIM?
Access Control List
Explain the difference between an access control list (ACL) that is used in routers to block traffic and how a firewall blocks traffic. What similarities do they share?
Use Promo Code: FIRST15